Skip to content

Commit c42469d

Browse files
committed
edit pass: tutorial-configure-networking-2
1 parent e295561 commit c42469d

File tree

3 files changed

+50
-50
lines changed

3 files changed

+50
-50
lines changed

articles/azure-vmware/deploy-azure-vmware-solution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ In the planning phase, you defined whether to use an *existing* or *new* Express
4242
4343
| If | Then |
4444
| --- | --- |
45-
| You don't already have a virtual network... | Create the following:<ol><li><a href="tutorial-configure-networking.md#create-a-vnet-manually">Virtual network</a></li><li><a href="../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet">GatewaySubnet</a></li><li><a href="tutorial-configure-networking.md#create-a-virtual-network-gateway">Virtual network gateway</a></li><li><a href="tutorial-configure-networking.md#connect-expressroute-to-the-virtual-network-gateway">Connect ExpressRoute to the gateway</a></li></ol> |
45+
| You don't already have a virtual network... | Create the following:<ol><li><a href="tutorial-configure-networking.md#create-a-virtual-network-manually">Virtual network</a></li><li><a href="../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet">GatewaySubnet</a></li><li><a href="tutorial-configure-networking.md#create-a-virtual-network-gateway">Virtual network gateway</a></li><li><a href="tutorial-configure-networking.md#connect-expressroute-to-the-virtual-network-gateway">Connect ExpressRoute to the gateway</a></li></ol> |
4646
| You already have a virtual network **without** a GatewaySubnet... | Create the following: <ol><li><a href="../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet">GatewaySubnet</a></li><li><a href="tutorial-configure-networking.md#create-a-virtual-network-gateway">Virtual network gateway</a></li><li><a href="tutorial-configure-networking.md#connect-expressroute-to-the-virtual-network-gateway">Connect ExpressRoute to the gateway</a></li></ol> |
4747
| You already have a virtual network **with** a GatewaySubnet... | Create the following: <ol><li><a href="tutorial-configure-networking.md#create-a-virtual-network-gateway">Virtual network gateway</a></li><li><a href="tutorial-configure-networking.md#connect-expressroute-to-the-virtual-network-gateway">Connect ExpressRoute to the gateway</a></li></ol> |
4848

articles/azure-vmware/enable-vmware-cds-with-azure.md

Lines changed: 36 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The following diagram shows typical architecture for Cloud Director services wit
2020

2121
:::image type="content" source="media/vmware-cds/reference-architecture-diagram.png" alt-text="Diagram showing typical architecture and how VMware Cloud Director service is connected with Azure VMware Solution." border="false" lightbox="media/vmware-cds/reference-architecture-diagram.png":::
2222

23-
VMware Cloud Director supports multi-tenancy by using organizations. A single organization can have multiple organization virtual data centers (VDC). Each Organizations VDC can have their own dedicated Tier-1 router (Edge Gateway) which is further connected with the provider managed shared Tier-0 router.
23+
VMware Cloud Director supports multi-tenancy by using organizations. A single organization can have multiple organization virtual data centers (VDC). Each Organization's VDC can have their own dedicated Tier-1 router (Edge Gateway) which is further connected with the provider managed shared Tier-0 router.
2424

2525
[Learn more about CDs on Azure VMware Solutions reference architecture](https://cloudsolutions.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/cloud-director-service-reference-architecture-for-azure-vmware-solution.pdf)
2626

@@ -37,17 +37,17 @@ Organization VDCs can be part of a single organization and still provide isolati
3737

3838
### Prerequisites
3939
- Organization VDC is configured with an Edge gateway and has Public IPs assigned to it to establish IPSEC VPN by provider.
40-
- Tenants created a routed Organization VDC network in tenants virtual datacenter.
40+
- Tenants created a routed Organization VDC network in tenant's virtual datacenter.
4141
- Test VM1 and VM2 are created in the Organization VDC1 and VDC2 respectively. Both VMs are connected to the routed orgVDC network in their respective VDCs.
42-
- Have a dedicated [Azure VNet](tutorial-configure-networking.md#create-a-vnet-manually) configured for each tenant. For this example, we created Tenant1-VNet and Tenant2-VNet for tenant1 and tenant2 respectively.
42+
- Have a dedicated [Azure VNet](tutorial-configure-networking.md#create-a-virtual-network-manually) configured for each tenant. For this example, we created Tenant1-VNet and Tenant2-VNet for tenant1 and tenant2 respectively.
4343
- Create an [Azure Virtual network gateway](tutorial-configure-networking.md#create-a-virtual-network-gateway) for VNETs created earlier.
4444
- Deploy Azure VMs JSVM1 and JSVM2 for tenant1 and tenant2 for test purposes.
4545

4646
> [!Note]
4747
> VMware Cloud Director service supports a policy-based VPN. Azure VPN gateway configures route-based VPN by default and to configure policy-based VPN policy-based selector needs to be enabled.
4848
4949
### Configure Azure VNet
50-
Create the following components in tenants dedicated Azure VNet to establish IPSEC tunnel connection with the tenants ORG VDC Edge gateway.
50+
Create the following components in tenant's dedicated Azure VNet to establish IPSEC tunnel connection with the tenant's ORG VDC Edge gateway.
5151
- Azure Virtual network gateway
5252
- Local network gateway.
5353
- Add IPSEC connection on VPN gateway.
@@ -57,12 +57,12 @@ Create the following components in tenant’s dedicated Azure VNet to establish
5757
To create an Azure virtual network gateway, see the [create-a-virtual-network-gateway tutorial](tutorial-configure-networking.md#create-a-virtual-network-gateway).
5858

5959
### Create local network gateway
60-
1. Sign in to the Azure portal and select **Local network gateway** from marketplace and then select **Create**.
61-
1. Local Network Gateway represents remote end site details. Therefore provide tenant1 OrgVDC public IP address and orgVDC Network details to create local end point for tenant1.
62-
1. Under **Instance details**, select **Endpoint** as IP address
63-
1. Add IP address (add Public IP address from tenants OrgVDC Edge gateway).
64-
1. Under **Address space** add **Tenants Org VDC Network**.
65-
1. Repeat steps 1-5 to create a local network gateway for tenant 2.
60+
1. Sign in to the Azure portal and select **Local network gateway** from marketplace and then select **Create**.
61+
1. Local Network Gateway represents remote end site details. Therefore provide tenant1 OrgVDC public IP address and orgVDC Network details to create local end point for tenant1.
62+
1. Under **Instance details**, select **Endpoint** as IP address
63+
1. Add IP address (add Public IP address from tenant's OrgVDC Edge gateway).
64+
1. Under **Address space** add **Tenants Org VDC Network**.
65+
1. Repeat steps 1-5 to create a local network gateway for tenant 2.
6666

6767
### Create IPSEC connection on VPN gateway
6868
1. Select tenant1 VPN Gateway (created earlier) and then select **Connection** (in left pane) to add new IPSEC connection with tenant1 orgVDC Edge gateway.
@@ -71,8 +71,8 @@ To create an Azure virtual network gateway, see the [create-a-virtual-network-ga
7171
| **Name** | **Connection** |
7272
|:---------- | :--------------|
7373
| Connection Type | Site to Site |
74-
| VPN Gateway | Tenants VPN Gateway |
75-
| Local Network Gateway | Tenants Local Gateway |
74+
| VPN Gateway | Tenant's VPN Gateway |
75+
| Local Network Gateway | Tenant's Local Gateway |
7676
| PSK | Shared Key (provide a password) |
7777
| IKE Protocol | IKEV2 (ORG-VDC is using IKEv2) |
7878

@@ -98,31 +98,31 @@ VMware Cloud Director service supports a policy-based VPN. Azure VPN gateway con
9898
>[!Note]
9999
> VPN tunnel won't establish if these settings were mismatched.
100100
1. Under **Peer Authentication Mode**, provide the same preshared key that is used at the Azure VPN gateway.
101-
1. Under **Endpoint configuration**, add the Organizations public IP and network details in local endpoint and Azure VNet details in remote endpoint configuration.
101+
1. Under **Endpoint configuration**, add the Organization's public IP and network details in local endpoint and Azure VNet details in remote endpoint configuration.
102102
1. Under **Ready to complete**, review applied configuration.
103103
1. Select **Finish** to apply configuration.
104104

105105
### Apply firewall configuration
106106
Organization VDC Edge router firewall denies traffic by default. You need to apply specific rules to enable connectivity. Use the following steps to apply firewall rules.
107107

108-
1. Add IP set in VMware Cloud Director service portal
109-
1. Sign in to Edge router then select **IP SETS** under the **Security** tab in left plane.
108+
1. Add IP set in VMware Cloud Director service portal
109+
1. Sign in to Edge router then select **IP SETS** under the **Security** tab in left plane.
110110
1. Select **New** to create IP sets.
111-
1. Enter **Name** and **IP address** of test VM deployed in orgVDC.
112-
1. Create another IP set for Azure VNet for this tenant.
113-
2. Apply firewall rules on ORG VDC Edge router.
111+
1. Enter **Name** and **IP address** of test VM deployed in orgVDC.
112+
1. Create another IP set for Azure VNet for this tenant.
113+
2. Apply firewall rules on ORG VDC Edge router.
114114
1. Under **Edge gateway**, select **Edge gateway** and then select **firewall** under **services**.
115-
1. Select **Edit rules**.
116-
1. Select **NEW ON TOP** and enter rule name.
115+
1. Select **Edit rules**.
116+
1. Select **NEW ON TOP** and enter rule name.
117117
1. Add **source** and **destination** details. Use created IPSET in source and destination.
118118
1. Under **Action**, select **Allow**.
119-
1. Select **Save** to apply configuration.
120-
3. Verify tunnel status
121-
1. Under **Edge gateway** select **Service**, then select **IPSEC VPN**,
119+
1. Select **Save** to apply configuration.
120+
3. Verify tunnel status
121+
1. Under **Edge gateway** select **Service**, then select **IPSEC VPN**,
122122
1. Select **View statistics**.
123123
Status of tunnel should show **UP**.
124-
4. Verify IPsec connection
125-
1. Sign in to Azure VM deployed in tenants VNet and ping tenants test VM IP address in tenants OrgVDC.
124+
4. Verify IPsec connection
125+
1. Sign in to Azure VM deployed in tenants VNet and ping tenant's test VM IP address in tenant's OrgVDC.
126126
For example, ping VM1 from JSVM1. Similarly, you should be able to ping VM2 from JSVM2.
127127
You can verify isolation between tenants Azure VNets. Tenant 1 VM1 can't ping Tenant 2 Azure VM JSVM2 in tenant 2 Azure VNets.
128128

@@ -135,21 +135,21 @@ You can verify isolation between tenants Azure VNets. Tenant 1 VM1 can't ping Te
135135
- OrgVDC Edge has default DENY ALL firewall rule. Organization administrators need to open appropriate ports to allow access through the firewall by adding a new firewall rule. Virtual machines configured on such OrgVDC network used in SNAT configuration should be able to access the Internet.
136136

137137
### Prerequisites
138-
1. Public IP is assigned to the organization VDC Edge router.
138+
1. Public IP is assigned to the organization VDC Edge router.
139139
To verify, sign in to the organization's VDC. Under **Networking**> **Edges**, select **Edge Gateway**, then select **IP allocations** under **IP management**. You should see a range of assigned IP address there.
140-
2. Create a routed Organization VDC network. (Connect OrgvDC network to the Edge gateway with public IP address assigned)
141-
140+
2. Create a routed Organization VDC network. (Connect OrgvDC network to the Edge gateway with public IP address assigned)
141+
142142
### Apply SNAT configuration
143-
1. Sign in to Organization VDC. Navigate to your Edge gateway and then select **NAT** under **Services**.
144-
2. Select **New** to add new SNAT rule.
145-
3. Provide **Name** and select **Interface type** as SNAT.
146-
4. Under **External IP**, enter public IP address from public IP pool assigned to your orgVDC Edge router.
147-
5. Under **Internal IP**, enter IP address for your test VM.
143+
1. Sign in to Organization VDC. Navigate to your Edge gateway and then select **NAT** under **Services**.
144+
2. Select **New** to add new SNAT rule.
145+
3. Provide **Name** and select **Interface type** as SNAT.
146+
4. Under **External IP**, enter public IP address from public IP pool assigned to your orgVDC Edge router.
147+
5. Under **Internal IP**, enter IP address for your test VM.
148148
This IP address is one of the orgVDC network IP assigned to the VM.
149-
6. **State** should be enabled.
150-
7. Under **Priority**, select a higher number.
149+
6. **State** should be enabled.
150+
7. Under **Priority**, select a higher number.
151151
For example, 4096.
152-
8. Select **Save** to save the configuration.
152+
8. Select **Save** to save the configuration.
153153

154154
### Apply firewall rule
155155
1. Sign in to Organization VDC and navigate to **Edge Gateway**, then select **IP set** under security.

articles/azure-vmware/tutorial-configure-networking.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 6/12/2024
99

1010
# Tutorial: Configure networking for your VMware private cloud in Azure
1111

12-
An Azure VMware Solution private cloud requires an Azure virtual network. Because Azure VMware Solution doesn't support your on-premises vCenter Server instance, you need to take extra steps to integrate with your on-premises environment. You also need to set up a virtual network gateway and an Azure ExpressRoute circuit.
12+
An Azure VMware Solution private cloud requires an Azure virtual network. Because Azure VMware Solution doesn't support an on-premises vCenter Server instance, you need to take extra steps to integrate with your on-premises environment. You also need to set up a virtual network gateway and an Azure ExpressRoute circuit.
1313

1414
[!INCLUDE [disk-pool-planning-note](includes/disk-pool-planning-note.md)]
1515

@@ -26,26 +26,26 @@ This tutorial assumes that you completed the [previous tutorial about creating a
2626
> [!NOTE]
2727
> Before you create a virtual network, evaluate whether you want to connect to Azure VMware Solution by using an existing virtual network or by creating a new one:
2828
>
29-
> * To use an existing virtual network in the same Azure subscription as Azure VMware Solution, use the [Azure VNet connect](#select-an-existing-vnet) tab on the **Connectivity** pane.
29+
> * To use an existing virtual network in the same Azure subscription as Azure VMware Solution, use the [Azure VNet connect](#select-an-existing-virtual-network) tab on the **Connectivity** pane.
3030
> * To use an existing virtual network in a different Azure subscription from Azure VMware Solution, use the guidance for [connecting to the private cloud manually](#connect-to-the-private-cloud-manually).
31-
> * To create a new virtual network in same Azure subscription as Azure VMware Solution, use the [Azure VNet connect](#create-a-new-vnet) tab or create one [manually](#create-a-vnet-manually).
31+
> * To create a new virtual network in the same Azure subscription as Azure VMware Solution, use the [Azure VNet connect](#create-a-new-virtual-network) tab or create one [manually](#create-a-virtual-network-manually).
3232
33-
## Connect to the private cloud by using the Azure VNet connect feature
34-
35-
You can take advantage of the **Azure VNet connect** feature if you want to connect to Azure VMware Solution by using an existing virtual network or by creating a new virtual network.
33+
## Prerequisites
3634

37-
**Azure VNet connect** is a function to configure virtual network connectivity. It doesn't record configuration state. Browse through the Azure portal to check what settings are already configured.
35+
* Make sure that the virtual network that you use for this tutorial:
3836

39-
### Prerequisites
40-
41-
Before you select an existing virtual network, you must meet these requirements:
42-
43-
* Make sure that the virtual network:
4437
* Contains a gateway subnet.
4538
* Is in the same region as the Azure VMware Solution private cloud.
4639
* Is in the same resource group as the Azure VMware Solution private cloud.
4740
* Contains an address space that doesn't overlap with CIDR in the Azure VMware Solution private cloud.
48-
* Validate that the solution design is within the [Azure VMware Solution limits](/azure/azure-resource-manager/management/azure-subscription-service-limits).
41+
42+
* Validate that your solution design is within the [Azure VMware Solution limits](/azure/azure-resource-manager/management/azure-subscription-service-limits).
43+
44+
## Connect to the private cloud by using the Azure VNet connect feature
45+
46+
You can take advantage of the **Azure VNet connect** feature if you want to connect to Azure VMware Solution by using an existing virtual network or by creating a new virtual network.
47+
48+
**Azure VNet connect** is a function to configure virtual network connectivity. It doesn't record configuration state. Browse through the Azure portal to check what settings are already configured.
4949

5050
### Select an existing virtual network
5151

0 commit comments

Comments
 (0)