Skip to content

Commit 9caf66a

Browse files
Merge pull request #226321 from rvandenbedem/patch-42
Update concepts-networking.md
2 parents aae13c3 + a8b507d commit 9caf66a

File tree

2 files changed

+6
-2
lines changed

2 files changed

+6
-2
lines changed

articles/azure-vmware/concepts-design-public-internet-access.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concept - Internet connectivity design considerations
33
description: Options for Azure VMware Solution Internet Connectivity.
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 9/17/2022
6+
ms.date: 2/4/2023
77
---
88

99
# Internet connectivity design considerations
@@ -66,6 +66,9 @@ The option that you select depends on the following factors:
6666
- There are scale limits on how many Azure Public IPv4 addresses can be allocated to a Network Virtual Appliance running in native Azure or provisioned on Azure Firewall. The Azure Public IPv4 address to NSX-T Data Center Edge option allows for much higher allocations (1,000s versus 100s).
6767
- Use an Azure Public IPv4 address to the NSX-T Data Center Edge for a localized exit to the internet from each private cloud in its local region. Using multiple Azure VMware Solution private clouds in several Azure regions that need to communicate with each other and the internet, it can be challenging to match an Azure VMware Solution private cloud with a security service in Azure. The difficulty is due to the way a default route from Azure works.
6868

69+
> [!IMPORTANT]
70+
> By design, Public IPv4 Address with NSX-T Data Center does not allow the exchange of Azure/Microsoft owned Public IP Addresses over ExpressRoute Private Peering connections. This means you cannot advertise the Public IPv4 addresses to your customer vNET or on-premises network via ExpressRoute. All Public IPv4 Addresses with NSX-T Data Center traffic must take the internet path even if the Azure VMware Solution private cloud is connected via ExpressRoute. For more information, visit [ExpressRoute Circuit Peering]: ../expressroute/expressroute-circuit-peerings.
71+
6972
## Next Steps
7073

7174
[Enable Managed SNAT for Azure VMware Solution Workloads](enable-managed-snat-for-workloads.md)

articles/azure-vmware/concepts-networking.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concepts - Network interconnectivity
33
description: Learn about key aspects and use cases of networking and interconnectivity in Azure VMware Solution.
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 10/25/2022
6+
ms.date: 2/4/2023
77
ms.custom: engagement-fy23
88
---
99

@@ -41,6 +41,7 @@ The diagram below shows the basic network interconnectivity established at the t
4141
- Outbound access from VMs on the private cloud to Azure services.
4242
- Inbound access of workloads running in the private cloud.
4343

44+
When connecting **production** Azure VMware Solution private clouds to an Azure virtual network, an ExpressRoute virtual network gateway with the Ultra Performance Gateway SKU should be used with FastPath enabled to achieve 10Gbps connectivity. Less critical environments can use the Standard or High Performance Gateway SKUs for slower network performance.
4445

4546
:::image type="content" source="media/concepts/adjacency-overview-drawing-single.png" alt-text="Diagram showing the basic network interconnectivity established at the time of an Azure VMware Solution private cloud deployment." border="false":::
4647

0 commit comments

Comments
 (0)