Skip to content

Commit b8de303

Browse files
author
rdeltcheva
committed
Change NAT GW to outbound ILB rules
1 parent fbbb580 commit b8de303

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/sap/workloads/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: sap-vm-workloads
1313
ms.topic: article
1414
ms.tgt_pltfrm: vm-windows
1515
ms.workload: infrastructure-services
16-
ms.date: 09/03/2023
16+
ms.date: 3/9/2023
1717
ms.author: radeltch
1818

1919
---
@@ -95,10 +95,11 @@ The configuration would look like:
9595
2. Create Backend pool **MyBackendPoolOfPublicILB** and add the VMs.
9696
1. Select the Virtual network
9797
1. Select the VMs and their IP addresses and add them to the backend pool
98-
3. [Create outbound rules](../../load-balancer/quickstart-load-balancer-standard-public-cli.md?tabs=option-1-create-load-balancer-standard%3ftabs%3doption-1-create-load-balancer-standard#create-outbound-rule-configuration).
98+
3. Create [outbound rules](../../load-balancer/egress-only.md#create-a-public-load-balancer-outbound-rule).
9999

100100
```azurecli
101101
az network lb outbound-rule create --address-pool MyBackendPoolOfPublicILB --frontend-ip-configs MyPublicILBFrondEndIP --idle-timeout 30 --lb-name MyPublicILB --name MyOutBoundRules --outbound-ports 10000 --enable-tcp-reset true --protocol All --resource-group MyResourceGroup
102+
102103
4. Create Network Security group rules to restrict access to specific Public End Points. If there is existing Network Security Group, you can adjust it. The example below shows how to enable access to the Azure management API:
103104
1. Navigate to the Network Security Group
104105
1. Click Outbound Security Rules

0 commit comments

Comments
 (0)