Skip to content

Commit a8b507d

Browse files
authored
Update concepts-design-public-internet-access.md
Added Azure/Microsoft IPv4 address limitation with ExpressRoute.
1 parent 5140e72 commit a8b507d

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/azure-vmware/concepts-design-public-internet-access.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concept - Internet connectivity design considerations
33
description: Options for Azure VMware Solution Internet Connectivity.
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 9/17/2022
6+
ms.date: 2/4/2023
77
---
88

99
# Internet connectivity design considerations
@@ -66,6 +66,9 @@ The option that you select depends on the following factors:
6666
- There are scale limits on how many Azure Public IPv4 addresses can be allocated to a Network Virtual Appliance running in native Azure or provisioned on Azure Firewall. The Azure Public IPv4 address to NSX-T Data Center Edge option allows for much higher allocations (1,000s versus 100s).
6767
- Use an Azure Public IPv4 address to the NSX-T Data Center Edge for a localized exit to the internet from each private cloud in its local region. Using multiple Azure VMware Solution private clouds in several Azure regions that need to communicate with each other and the internet, it can be challenging to match an Azure VMware Solution private cloud with a security service in Azure. The difficulty is due to the way a default route from Azure works.
6868

69+
> [!IMPORTANT]
70+
> By design, Public IPv4 Address with NSX-T Data Center does not allow the exchange of Azure/Microsoft owned Public IP Addresses over ExpressRoute Private Peering connections. This means you cannot advertise the Public IPv4 addresses to your customer vNET or on-premises network via ExpressRoute. All Public IPv4 Addresses with NSX-T Data Center traffic must take the internet path even if the Azure VMware Solution private cloud is connected via ExpressRoute. For more information, visit [ExpressRoute Circuit Peering]: ../expressroute/expressroute-circuit-peerings.
71+
6972
## Next Steps
7073

7174
[Enable Managed SNAT for Azure VMware Solution Workloads](enable-managed-snat-for-workloads.md)

0 commit comments

Comments
 (0)