You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article describes how to use Azure Load Balancer with multiple IP addresses on a secondary network interface (NIC). For this scenario, we have two VMs running Windows, each with a primary and a secondary NIC. Each of the secondary NICs has two IP configurations. Each VM hosts both websites contoso.com and fabrikam.com. Each website is bound to one of the IP configurations on the secondary NIC. We use Azure Load Balancer to expose two frontend IP addresses, one for each website, to distribute traffic to the respective IP configuration for the website. This scenario uses the same port number across both frontends, as well as both backend pool IP addresses.
21
+
This article describes how to use Azure Load Balancer with multiple IP addresses on a secondary network interface (NIC). For this scenario, we have two VMs running Windows, each with a primary and a secondary NIC. Each of the secondary NICs has two IP configurations. Each VM hosts both websites contoso.com and fabrikam.com. Each website is bound to one of the IP configurations on the secondary NIC. We use Azure Load Balancer to expose two frontend IP addresses, one for each website, to distribute traffic to the respective IP configuration for the website. This scenario uses the same port number across both frontends, and both backend pool IP addresses.
22
22
23
23
## Steps to load balance on multiple IP configurations
24
24
@@ -61,9 +61,9 @@ Follow the steps below to achieve the scenario outlined in this article:
You do not need to associate the secondary IP configurations with public IPs for the purpose of this tutorial. Edit the command to remove the public IP association part.
64
+
You don't need to associate the secondary IP configurations with public IPs in this tutorial. Edit the command to remove the public IP association part.
65
65
66
-
6. Complete steps 4 through 6 of this article again for VM2. Be sure to replace the VM name to VM2 when doing this. Note that you do not need to create a virtual network for the second VM. You may or may not create a new subnet based on your use case.
66
+
6. Complete steps 4 through 6 of this article again for VM2. Be sure to replace the VM name to VM2 when doing this. You don't need to create a virtual network for the second VM. You can create a new subnet based on your use case.
67
67
68
68
7. Create two public IP addresses and store them in the appropriate variables as shown:
69
69
@@ -127,7 +127,7 @@ Follow the steps below to achieve the scenario outlined in this article:
127
127
$nic2 | Set-AzNetworkInterface
128
128
```
129
129
130
-
13. Finally, you must configure DNS resource records to point to the respective frontend IP address of the Load Balancer. You may host your domains in Azure DNS. For more information about using Azure DNS with Load Balancer, see [Using Azure DNS with other Azure services](../dns/dns-for-azure-services.md).
130
+
13. Finally, you must configure DNS resource records to point to the respective frontend IP address of the Load Balancer. You can host your domains in Azure DNS. For more information about using Azure DNS with Load Balancer, see [Using Azure DNS with other Azure services](../dns/dns-for-azure-services.md).
131
131
132
132
## Next steps
133
133
- Learn more about how to combine load balancing services in Azure in [Using load-balancing services in Azure](../traffic-manager/traffic-manager-load-balancing-azure.md).
Copy file name to clipboardExpand all lines: includes/load-balancer-nat-gateway.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@
12
12
13
13
## Create NAT gateway
14
14
15
-
In this section, you'll create a NAT gateway for outbound internet access for resources in the virtual network. For other options for outbound rules, check out [Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections)
15
+
In this section, you create a NAT gateway for outbound internet access for resources in the virtual network. For other options for outbound rules, check out [Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections)
16
16
17
17
1. Sign in to the [Azure portal](https://portal.azure.com).
18
18
@@ -26,7 +26,7 @@ In this section, you'll create a NAT gateway for outbound internet access for re
26
26
| ------- | ----- |
27
27
|**Project details**||
28
28
| Subscription | Select your subscription. |
29
-
| Resource group | Select **Create new**.</br> Enter **load-balancer-rg** in Name.</br> Select **OK**. |
29
+
| Resource group | Select **Create new**.</br> Enter **load-balancer-rg** in Name.</br> Select **OK**. |
0 commit comments