You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/enable-public-ip-nsx-edge.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,7 +90,7 @@ A Source Network Address Translation (SNAT) service with Port Address Translatio
90
90
91
91
#### Create a SNAT rule
92
92
93
-
1. In your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
93
+
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
94
94
1. Locate your NSX Manager URL and credentials.
95
95
1. Sign in to VMware NSX Manager.
96
96
1. Go to **NAT Rules**.
@@ -116,7 +116,8 @@ For more information on NSX-T Data Center NAT configuration and options, see the
116
116
117
117
You can create a No-NAT or No-SNAT rule in NSX Manager to exclude certain matches from performing NAT. This policy can be used to allow private IP address traffic to bypass existing network translation rules.
118
118
119
-
1. In your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
119
+
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
120
+
1. Locate your NSX Manager URL and credentials.
120
121
1. Sign in to NSX Manager, and then select **NAT Rules**.
121
122
1. Select the T1 router, and then select **Add NAT Rule**.
122
123
1. Select **No SNAT** rule as the type of NAT rule.
@@ -129,7 +130,8 @@ A Destination Network Translation (DNAT) service is used to expose a VM on a spe
129
130
130
131
#### Create a DNAT rule
131
132
132
-
1. In your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
133
+
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
134
+
1. Locate your NSX Manager URL and credentials.
133
135
1. Sign in to NSX Manager, and then select **NAT Rules**.
134
136
1. Select the T1 router, and then select **Add DNAT Rule**.
135
137
1. Enter a name for the rule.
@@ -147,6 +149,7 @@ The VM is now exposed to the internet on the specific public IP address or on sp
147
149
You can provide security protection for your network traffic in and out of the public internet through your gateway firewall.
148
150
149
151
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
152
+
1. Locate your NSX Manager URL and credentials.
150
153
1. Sign in to NSX Manager.
151
154
1. On the NSX-T overview page, select **Gateway Policies**.
152
155
1. Select **Gateway Specific Rules**, choose the T1 gateway, and then select **Add Policy**.
0 commit comments