Skip to content

Commit a1ec5bb

Browse files
Merge pull request #298865 from b-ahibbard/subnetsize
remove subnet size recommendation
2 parents 50a81b2 + 77f8005 commit a1ec5bb

File tree

1 file changed

+7
-11
lines changed

1 file changed

+7
-11
lines changed

articles/azure-netapp-files/azure-netapp-files-network-topologies.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -93,29 +93,25 @@ If you use a new VNet, you can create a subnet and delegate the subnet to Azure
9393

9494
If the VNet is peered with another VNet, you can't expand the VNet address space. For that reason, the new delegated subnet needs to be created within the VNet address space. If you need to extend the address space, you must delete the VNet peering before expanding the address space.
9595

96-
>[!IMPORTANT]
97-
> Ensure the address space size of the Azure NetApp Files VNet is larger than its delegated subnet.
98-
>
99-
> For example, if the delegated subnet is /24, the VNet address space containing the subnet must be /23 or larger. Noncompliance with this guideline can lead to unexpected issues in some traffic patterns: traffic traversing a hub-and-spoke topology that reaches Azure NetApp Files via a Network Virtual Appliance does not function properly. Additionally, this configuration can result in failures when creating SMB and CIFS (Common Internet File System) volumes if they attempt to reach DNS through hub-and-spoke network topology.
100-
>
101-
> It's also recommended that the size of the delegated subnet be at least /25 for SAP workloads and /26 for other workload scenarios.
96+
>[!NOTE]
97+
> It's recommended that the size of the delegated subnet be at least /25 for SAP workloads and /26 for other workload scenarios.
10298
10399
### <a name="udrs-and-nsgs"></a> User-defined routes (UDRs) and network security groups (NSGs)
104100

105101
If the subnet has a combination of volumes with the Standard and Basic network features, user-defined routes (UDRs) and network security groups (NSGs) applied on the delegated subnets will only apply to the volumes with the Standard network features.
106102

107103
> [!NOTE]
108-
> Associating NSGs at the network interface level is not supported for the Azure NetApp Files network interfaces.
104+
> Associating NSGs at the network interface level isn't supported for the Azure NetApp Files network interfaces.
109105
110106
Configuring UDRs on the source VM subnets with the address prefix of delegated subnet and next hop as NVA isn't supported for volumes with the Basic network features. Such a setting will result in connectivity issues.
111107

112108
> [!NOTE]
113-
> To access an Azure NetApp Files volume from an on-premises network via a VNet gateway (ExpressRoute or VPN) and firewall, configure the route table assigned to the VNet gateway to include the `/32` IPv4 address of the Azure NetApp Files volume listed and point to the firewall as the next hop. Using an aggregate address space that includes the Azure NetApp Files volume IP address will not forward the Azure NetApp Files traffic to the firewall.
109+
> To access an Azure NetApp Files volume from an on-premises network via a VNet gateway (ExpressRoute or VPN) and firewall, configure the route table assigned to the VNet gateway to include the `/32` IPv4 address of the Azure NetApp Files volume listed and point to the firewall as the next hop. Using an aggregate address space that includes the Azure NetApp Files volume IP address doesn't forward the Azure NetApp Files traffic to the firewall.
114110
115111
>[!NOTE]
116-
> If you want to configure a route table (UDR route) to control the routing of packets through a network virtual appliance or firewall destined to an Azure NetApp Files standard volume from a source in the same VNet or a peered VNet, the UDR prefix must be more specific or equal to the delegated subnet size of the Azure NetApp Files volume. If the UDR prefix is less specific than the delegated subnet size, it isn't be effective.
112+
> If you want to configure a route table (UDR route) to control the routing of packets through a network virtual appliance or firewall destined to an Azure NetApp Files standard volume from a source in the same VNet or a peered VNet, the UDR prefix must be more specific or equal to the delegated subnet size of the Azure NetApp Files volume. If the UDR prefix is less specific than the delegated subnet size, it isn't effective.
117113
>
118-
> For example, if your delegated subnet is `x.x.x.x/24`, you must configured your UDR to `x.x.x.x/24` (equal) or `x.x.x.x/32` (more specific). If you configure the UDR route to be `x.x.x.x/16`, undefined behaviors such as asymmetric routing can cause a network drop at the firewall.
114+
> For example, if your delegated subnet is `x.x.x.x/24`, you must configure your UDR to `x.x.x.x/24` (equal) or `x.x.x.x/32` (more specific). If you configure the UDR route to be `x.x.x.x/16`, undefined behaviors such as asymmetric routing can cause a network drop at the firewall.
119115
120116
## Azure native environments
121117

@@ -129,7 +125,7 @@ A basic scenario is to create or connect to an Azure NetApp Files volume from a
129125

130126
### <a name="vnet-peering"></a> VNet peering
131127

132-
If you have other VNets in the same region that need access to each other’s resources, the VNets can be connected using [VNet peering](../virtual-network/virtual-network-peering-overview.md) to enable secure connectivity through the Azure infrastructure.
128+
If you have other VNets in the same region requiring access to each other’s resources, the VNets can be connected using [VNet peering](../virtual-network/virtual-network-peering-overview.md) to enable secure connectivity through the Azure infrastructure.
133129

134130
Consider VNet 2 and VNet 3 in the diagram above. If VM 1 needs to connect to VM 2 or Volume 2, or if VM 2 needs to connect to VM 1 or Volume 1, then you need to enable VNet peering between VNet 2 and VNet 3.
135131

0 commit comments

Comments
 (0)