Skip to content

Commit bd356b6

Browse files
Merge pull request #241539 from thisisanniefang/patch-53
Update load-balancer-outbound-connections.md
2 parents b9fbde6 + 2a5c21c commit bd356b6

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

articles/load-balancer/load-balancer-outbound-connections.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,11 @@ By definition, every IP address has 65,535 ports. Each port can either be used f
108108

109109
Each port used in a load balancing or inbound NAT rule consumes a range of eight ports from the 64,000 available SNAT ports. This usage reduces the number of ports eligible for SNAT, if the same frontend IP is used for outbound connectivity. If load-balancing or inbound NAT rules consumed ports are in the same block of eight ports consumed by another rule, the rules don't require extra ports.
110110

111+
> [!NOTE]
112+
> If you need to connect to any [supported Azure PaaS services](../private-link/availability.md) like Azure Storage, Azure SQL, or Azure Cosmos DB, you can use Azure Private Link to avoid SNAT entirely. Azure Private Link sends traffic from your virtual network to Azure services over the Azure backbone network instead of over the internet.
113+
>
114+
> Private Link is the recommended option over service endpoints for private access to Azure hosted services. For more information on the difference between Private Link and service endpoints, see [Compare Private Endpoints and Service Endpoints](../virtual-network/vnet-integration-for-azure-services.md#compare-private-endpoints-and-service-endpoints).
115+
111116
### How does default SNAT work?
112117

113118
When a VM creates an outbound flow, Azure translates the source IP address to an ephemeral IP address. This translation is done via SNAT.

0 commit comments

Comments
 (0)