You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/virtual-network-scenario-udr-gw-nva.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,10 +27,10 @@ This example is a standard perimeter network (also known as DMZ) scenario with a
27
27
28
28
The following table shows some of the pros and cons between NSGs and firewall virtual appliances.
29
29
30
-
| Pros | Cons |
30
+
| Pros | Cons |
31
31
| --- | --- |
32
-
|**NSG**| No cost. <br/>Integrated into Azure role based access. <br/>Rules can be created in Azure Resource Manager templates. | Complexity could vary in larger environments. |
33
-
|**Firewall**| Full control over data plane. <br/>Central management through firewall console. |Cost of firewall appliance. <br/>Not integrated with Azure role based access. |
32
+
|**NSG**| No cost. <br/>Integrated into Azure role based access. <br/>Rules can be created in Azure Resource Manager templates. </br> Complexity could vary in larger environments. |
33
+
|**Firewall**| Full control over data plane. <br/>Central management through firewall console. |Cost of firewall appliance. <br/>Not integrated with Azure role based access. |
34
34
35
35
The following solution uses firewall virtual appliances to implement a perimeter network (DMZ)/protected network scenario.
0 commit comments