Skip to content

Commit bb49478

Browse files
authored
Merge pull request #278346 from ShawnJackson/tutorial-configure-networking-2
[AQ] edit pass: tutorial-configure-networking
2 parents 3574649 + ad6f7c4 commit bb49478

File tree

6 files changed

+136
-140
lines changed

6 files changed

+136
-140
lines changed

articles/azure-vmware/deploy-azure-vmware-solution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ In the planning phase, you defined whether to use an *existing* or *new* Express
4242
4343
| If | Then |
4444
| --- | --- |
45-
| You don't already have a virtual network... | Create the following:<ol><li><a href="tutorial-configure-networking.md#create-a-vnet-manually">Virtual network</a></li><li><a href="../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet">GatewaySubnet</a></li><li><a href="tutorial-configure-networking.md#create-a-virtual-network-gateway">Virtual network gateway</a></li><li><a href="tutorial-configure-networking.md#connect-expressroute-to-the-virtual-network-gateway">Connect ExpressRoute to the gateway</a></li></ol> |
45+
| You don't already have a virtual network... | Create the following:<ol><li><a href="tutorial-configure-networking.md#create-a-virtual-network-manually">Virtual network</a></li><li><a href="../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet">GatewaySubnet</a></li><li><a href="tutorial-configure-networking.md#create-a-virtual-network-gateway">Virtual network gateway</a></li><li><a href="tutorial-configure-networking.md#connect-expressroute-to-the-virtual-network-gateway">Connect ExpressRoute to the gateway</a></li></ol> |
4646
| You already have a virtual network **without** a GatewaySubnet... | Create the following: <ol><li><a href="../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet">GatewaySubnet</a></li><li><a href="tutorial-configure-networking.md#create-a-virtual-network-gateway">Virtual network gateway</a></li><li><a href="tutorial-configure-networking.md#connect-expressroute-to-the-virtual-network-gateway">Connect ExpressRoute to the gateway</a></li></ol> |
4747
| You already have a virtual network **with** a GatewaySubnet... | Create the following: <ol><li><a href="tutorial-configure-networking.md#create-a-virtual-network-gateway">Virtual network gateway</a></li><li><a href="tutorial-configure-networking.md#connect-expressroute-to-the-virtual-network-gateway">Connect ExpressRoute to the gateway</a></li></ol> |
4848

articles/azure-vmware/enable-vmware-cds-with-azure.md

Lines changed: 36 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The following diagram shows typical architecture for Cloud Director services wit
2020

2121
:::image type="content" source="media/vmware-cds/reference-architecture-diagram.png" alt-text="Diagram showing typical architecture and how VMware Cloud Director service is connected with Azure VMware Solution." border="false" lightbox="media/vmware-cds/reference-architecture-diagram.png":::
2222

23-
VMware Cloud Director supports multi-tenancy by using organizations. A single organization can have multiple organization virtual data centers (VDC). Each Organizations VDC can have their own dedicated Tier-1 router (Edge Gateway) which is further connected with the provider managed shared Tier-0 router.
23+
VMware Cloud Director supports multi-tenancy by using organizations. A single organization can have multiple organization virtual data centers (VDC). Each Organization's VDC can have their own dedicated Tier-1 router (Edge Gateway) which is further connected with the provider managed shared Tier-0 router.
2424

2525
[Learn more about CDs on Azure VMware Solutions reference architecture](https://cloudsolutions.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/cloud-director-service-reference-architecture-for-azure-vmware-solution.pdf)
2626

@@ -37,17 +37,17 @@ Organization VDCs can be part of a single organization and still provide isolati
3737

3838
### Prerequisites
3939
- Organization VDC is configured with an Edge gateway and has Public IPs assigned to it to establish IPSEC VPN by provider.
40-
- Tenants created a routed Organization VDC network in tenants virtual datacenter.
40+
- Tenants created a routed Organization VDC network in tenant's virtual datacenter.
4141
- Test VM1 and VM2 are created in the Organization VDC1 and VDC2 respectively. Both VMs are connected to the routed orgVDC network in their respective VDCs.
42-
- Have a dedicated [Azure VNet](tutorial-configure-networking.md#create-a-vnet-manually) configured for each tenant. For this example, we created Tenant1-VNet and Tenant2-VNet for tenant1 and tenant2 respectively.
42+
- Have a dedicated [Azure VNet](tutorial-configure-networking.md#create-a-virtual-network-manually) configured for each tenant. For this example, we created Tenant1-VNet and Tenant2-VNet for tenant1 and tenant2 respectively.
4343
- Create an [Azure Virtual network gateway](tutorial-configure-networking.md#create-a-virtual-network-gateway) for VNETs created earlier.
4444
- Deploy Azure VMs JSVM1 and JSVM2 for tenant1 and tenant2 for test purposes.
4545

4646
> [!Note]
4747
> VMware Cloud Director service supports a policy-based VPN. Azure VPN gateway configures route-based VPN by default and to configure policy-based VPN policy-based selector needs to be enabled.
4848
4949
### Configure Azure VNet
50-
Create the following components in tenants dedicated Azure VNet to establish IPSEC tunnel connection with the tenants ORG VDC Edge gateway.
50+
Create the following components in tenant's dedicated Azure VNet to establish IPSEC tunnel connection with the tenant's ORG VDC Edge gateway.
5151
- Azure Virtual network gateway
5252
- Local network gateway.
5353
- Add IPSEC connection on VPN gateway.
@@ -57,12 +57,12 @@ Create the following components in tenant’s dedicated Azure VNet to establish
5757
To create an Azure virtual network gateway, see the [create-a-virtual-network-gateway tutorial](tutorial-configure-networking.md#create-a-virtual-network-gateway).
5858

5959
### Create local network gateway
60-
1. Sign in to the Azure portal and select **Local network gateway** from marketplace and then select **Create**.
61-
1. Local Network Gateway represents remote end site details. Therefore provide tenant1 OrgVDC public IP address and orgVDC Network details to create local end point for tenant1.
62-
1. Under **Instance details**, select **Endpoint** as IP address
63-
1. Add IP address (add Public IP address from tenants OrgVDC Edge gateway).
64-
1. Under **Address space** add **Tenants Org VDC Network**.
65-
1. Repeat steps 1-5 to create a local network gateway for tenant 2.
60+
1. Sign in to the Azure portal and select **Local network gateway** from marketplace and then select **Create**.
61+
1. Local Network Gateway represents remote end site details. Therefore provide tenant1 OrgVDC public IP address and orgVDC Network details to create local end point for tenant1.
62+
1. Under **Instance details**, select **Endpoint** as IP address
63+
1. Add IP address (add Public IP address from tenant's OrgVDC Edge gateway).
64+
1. Under **Address space** add **Tenants Org VDC Network**.
65+
1. Repeat steps 1-5 to create a local network gateway for tenant 2.
6666

6767
### Create IPSEC connection on VPN gateway
6868
1. Select tenant1 VPN Gateway (created earlier) and then select **Connection** (in left pane) to add new IPSEC connection with tenant1 orgVDC Edge gateway.
@@ -71,8 +71,8 @@ To create an Azure virtual network gateway, see the [create-a-virtual-network-ga
7171
| **Name** | **Connection** |
7272
|:---------- | :--------------|
7373
| Connection Type | Site to Site |
74-
| VPN Gateway | Tenants VPN Gateway |
75-
| Local Network Gateway | Tenants Local Gateway |
74+
| VPN Gateway | Tenant's VPN Gateway |
75+
| Local Network Gateway | Tenant's Local Gateway |
7676
| PSK | Shared Key (provide a password) |
7777
| IKE Protocol | IKEV2 (ORG-VDC is using IKEv2) |
7878

@@ -98,31 +98,31 @@ VMware Cloud Director service supports a policy-based VPN. Azure VPN gateway con
9898
>[!Note]
9999
> VPN tunnel won't establish if these settings were mismatched.
100100
1. Under **Peer Authentication Mode**, provide the same preshared key that is used at the Azure VPN gateway.
101-
1. Under **Endpoint configuration**, add the Organizations public IP and network details in local endpoint and Azure VNet details in remote endpoint configuration.
101+
1. Under **Endpoint configuration**, add the Organization's public IP and network details in local endpoint and Azure VNet details in remote endpoint configuration.
102102
1. Under **Ready to complete**, review applied configuration.
103103
1. Select **Finish** to apply configuration.
104104

105105
### Apply firewall configuration
106106
Organization VDC Edge router firewall denies traffic by default. You need to apply specific rules to enable connectivity. Use the following steps to apply firewall rules.
107107

108-
1. Add IP set in VMware Cloud Director service portal
109-
1. Sign in to Edge router then select **IP SETS** under the **Security** tab in left plane.
108+
1. Add IP set in VMware Cloud Director service portal
109+
1. Sign in to Edge router then select **IP SETS** under the **Security** tab in left plane.
110110
1. Select **New** to create IP sets.
111-
1. Enter **Name** and **IP address** of test VM deployed in orgVDC.
112-
1. Create another IP set for Azure VNet for this tenant.
113-
2. Apply firewall rules on ORG VDC Edge router.
111+
1. Enter **Name** and **IP address** of test VM deployed in orgVDC.
112+
1. Create another IP set for Azure VNet for this tenant.
113+
2. Apply firewall rules on ORG VDC Edge router.
114114
1. Under **Edge gateway**, select **Edge gateway** and then select **firewall** under **services**.
115-
1. Select **Edit rules**.
116-
1. Select **NEW ON TOP** and enter rule name.
115+
1. Select **Edit rules**.
116+
1. Select **NEW ON TOP** and enter rule name.
117117
1. Add **source** and **destination** details. Use created IPSET in source and destination.
118118
1. Under **Action**, select **Allow**.
119-
1. Select **Save** to apply configuration.
120-
3. Verify tunnel status
121-
1. Under **Edge gateway** select **Service**, then select **IPSEC VPN**,
119+
1. Select **Save** to apply configuration.
120+
3. Verify tunnel status
121+
1. Under **Edge gateway** select **Service**, then select **IPSEC VPN**,
122122
1. Select **View statistics**.
123123
Status of tunnel should show **UP**.
124-
4. Verify IPsec connection
125-
1. Sign in to Azure VM deployed in tenants VNet and ping tenants test VM IP address in tenants OrgVDC.
124+
4. Verify IPsec connection
125+
1. Sign in to Azure VM deployed in tenants VNet and ping tenant's test VM IP address in tenant's OrgVDC.
126126
For example, ping VM1 from JSVM1. Similarly, you should be able to ping VM2 from JSVM2.
127127
You can verify isolation between tenants Azure VNets. Tenant 1 VM1 can't ping Tenant 2 Azure VM JSVM2 in tenant 2 Azure VNets.
128128

@@ -135,21 +135,21 @@ You can verify isolation between tenants Azure VNets. Tenant 1 VM1 can't ping Te
135135
- OrgVDC Edge has default DENY ALL firewall rule. Organization administrators need to open appropriate ports to allow access through the firewall by adding a new firewall rule. Virtual machines configured on such OrgVDC network used in SNAT configuration should be able to access the Internet.
136136

137137
### Prerequisites
138-
1. Public IP is assigned to the organization VDC Edge router.
138+
1. Public IP is assigned to the organization VDC Edge router.
139139
To verify, sign in to the organization's VDC. Under **Networking**> **Edges**, select **Edge Gateway**, then select **IP allocations** under **IP management**. You should see a range of assigned IP address there.
140-
2. Create a routed Organization VDC network. (Connect OrgvDC network to the Edge gateway with public IP address assigned)
141-
140+
2. Create a routed Organization VDC network. (Connect OrgvDC network to the Edge gateway with public IP address assigned)
141+
142142
### Apply SNAT configuration
143-
1. Sign in to Organization VDC. Navigate to your Edge gateway and then select **NAT** under **Services**.
144-
2. Select **New** to add new SNAT rule.
145-
3. Provide **Name** and select **Interface type** as SNAT.
146-
4. Under **External IP**, enter public IP address from public IP pool assigned to your orgVDC Edge router.
147-
5. Under **Internal IP**, enter IP address for your test VM.
143+
1. Sign in to Organization VDC. Navigate to your Edge gateway and then select **NAT** under **Services**.
144+
2. Select **New** to add new SNAT rule.
145+
3. Provide **Name** and select **Interface type** as SNAT.
146+
4. Under **External IP**, enter public IP address from public IP pool assigned to your orgVDC Edge router.
147+
5. Under **Internal IP**, enter IP address for your test VM.
148148
This IP address is one of the orgVDC network IP assigned to the VM.
149-
6. **State** should be enabled.
150-
7. Under **Priority**, select a higher number.
149+
6. **State** should be enabled.
150+
7. Under **Priority**, select a higher number.
151151
For example, 4096.
152-
8. Select **Save** to save the configuration.
152+
8. Select **Save** to save the configuration.
153153

154154
### Apply firewall rule
155155
1. Sign in to Organization VDC and navigate to **Edge Gateway**, then select **IP set** under security.
Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Connect ExpressRoute to the virtual network gateway
3-
description: Steps to connect ExpressRoute to the virtual network gateway.
2+
title: Connect ExpressRoute to a virtual network gateway
3+
description: Steps to connect ExpressRoute to a virtual network gateway.
44
ms.topic: include
55
ms.service: azure-vmware
66
ms.date: 1/03/2024
@@ -11,26 +11,25 @@ ms.custom: engagement-fy23
1111

1212
<!-- Used in deploy-azure-vmware-solution.md and tutorial-configure-networking.md -->
1313

14-
1514
1. Request an ExpressRoute authorization key:
1615

1716
[!INCLUDE [request-authorization-key](request-authorization-key.md)]
1817

19-
1. Navigate to the virtual network gateway you plan to use and select **Connections** > **+ Add**.
18+
1. Go to the virtual network gateway that you plan to use, and then select **Connections** > **+ Add**.
2019

21-
1. On the **Add connection** page, provide values for the fields, and select **OK**.
20+
1. On the **Add connection** pane, provide the following values, and then select **OK**.
2221

2322
| Field | Value |
2423
| --- | --- |
2524
| **Name** | Enter a name for the connection. |
2625
| **Connection type** | Select **ExpressRoute**. |
27-
| **Redeem authorization** | Ensure this box is selected. |
28-
| **Virtual network gateway** | The virtual network gateway you intend to use. |
29-
| **Authorization key** | Paste the authorization key you copied earlier. |
30-
| **Peer circuit URI** | Paste the ExpressRoute ID you copied earlier. |
26+
| **Redeem authorization** | Ensure that this checkbox is selected. |
27+
| **Virtual network gateway** | The value is prepopulated with the virtual network gateway that you intend to use. |
28+
| **Authorization key** | Paste the authorization key that you copied earlier. |
29+
| **Peer circuit URI** | Paste the ExpressRoute ID that you copied earlier. |
3130

32-
:::image type="content" source="../media/tutorial-configure-networking/add-connection.png" alt-text="Screenshot shows the Add connection page to connect ExpressRoute to the virtual network gateway.":::
31+
:::image type="content" source="../media/tutorial-configure-networking/add-connection.png" alt-text="Screenshot that shows the pane for adding an ExpressRoute connection to a virtual network gateway.":::
3332

34-
The connection between your ExpressRoute circuit and your Virtual Network is created.
33+
A status of **Succeeded** indicates that you finished creating the connection between your ExpressRoute circuit and your virtual network.
3534

36-
:::image type="content" source="../media/expressroute-global-reach/virtual-network-gateway-connections.png" alt-text="Screenshot shows a successful virtual network gateway connection.":::
35+
:::image type="content" source="../media/expressroute-global-reach/virtual-network-gateway-connections.png" alt-text="Screenshot that shows a successful virtual network gateway connection.":::

articles/azure-vmware/includes/disk-pool-planning-note.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Disk pool planning note for vNet
3-
description: Important note about the importance of deploying a vNet closer to Azure VMware Solution hosts.
2+
title: Disk pool planning note for virtual networks
3+
description: Information about the importance of deploying a virtual network closer to Azure VMware Solution hosts.
44
ms.topic: include
55
ms.service: azure-vmware
66
ms.date: 1/03/2024
@@ -15,4 +15,4 @@ ms.custom: engagement-fy23
1515
---
1616

1717

18-
If you plan to scale your Azure VMware Solution hosts using [Azure NetApp Files datastores](../attach-azure-netapp-files-to-azure-vmware-solution-hosts.md), deploying the vNet close to your hosts with an ExpressRoute virtual network gateway is crucial. The closer the storage is to your hosts, the better the performance.
18+
If you plan to scale your Azure VMware Solution hosts by using [Azure NetApp Files datastores](../attach-azure-netapp-files-to-azure-vmware-solution-hosts.md), deploying the virtual network close to your hosts with an ExpressRoute virtual network gateway is crucial. The closer the storage is to your hosts, the better the performance.
Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Request authorization key for ExpressRoute
2+
title: Request an authorization key for ExpressRoute
33
description: Steps to request an authorization key for ExpressRoute.
44
ms.topic: include
55
ms.service: azure-vmware
@@ -11,15 +11,18 @@ ms.custom: engagement-fy23
1111

1212
<!-- used in tutorial-expressroute-global-reach-private-cloud.md and create-ipsec-tunnel.md -->
1313

14-
1. In the Azure portal, navigate to the Azure VMware Solution private cloud. Select **Manage** > **Connectivity** > **ExpressRoute** and then select **+ Request an authorization key**.
14+
1. In the Azure portal, go to the Azure VMware Solution private cloud.
1515

16-
:::image type="content" source="../media/expressroute-global-reach/start-request-authorization-key.png" alt-text="Screenshot shows how to request an ExpressRoute authorization key." border="true" lightbox="../media/expressroute-global-reach/start-request-authorization-key.png":::
16+
1. Under **Manage**, select **Connectivity**.
1717

18-
1. Provide a name for it and select **Create**.
18+
1. Select the **ExpressRoute** tab, and then select **+ Request an authorization key**.
1919

20-
It can take about 30 seconds to create the key. Once created, the new key appears in the list of authorization keys for the private cloud.
20+
:::image type="content" source="../media/expressroute-global-reach/start-request-authorization-key.png" alt-text="Screenshot that shows selections for requesting an ExpressRoute authorization key." border="true" lightbox="../media/expressroute-global-reach/start-request-authorization-key.png":::
2121

22-
:::image type="content" source="../media/expressroute-global-reach/show-global-reach-auth-key.png" alt-text="Screenshot shows the ExpressRoute Global Reach authorization key." lightbox="../media/expressroute-global-reach/show-global-reach-auth-key.png":::
23-
24-
1. Copy the authorization key and ExpressRoute ID. You need them to complete the peering. The authorization key disappears after some time, so copy it as soon as it appears.
22+
1. Provide a name for the authorization key, and then select **Create**.
2523

24+
It can take about 30 seconds to create the key. After the key is created, it appears in the list of authorization keys for the private cloud.
25+
26+
:::image type="content" source="../media/expressroute-global-reach/show-global-reach-auth-key.png" alt-text="Screenshot that shows the ExpressRoute Global Reach authorization key." lightbox="../media/expressroute-global-reach/show-global-reach-auth-key.png":::
27+
28+
1. Copy the authorization key and the ExpressRoute ID. You need them to complete the peering. The authorization key disappears after some time, so copy it as soon as it appears.

0 commit comments

Comments
 (0)