Skip to content

Commit c4ad3b6

Browse files
authored
Merge pull request #120983 from rahi-ms/patch-8
Update enable-public-ip-nsx-edge.md
2 parents f38e7b9 + a0a43c6 commit c4ad3b6

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

articles/azure-vmware/enable-public-ip-nsx-edge.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ A Source Network Address Translation (SNAT) service with Port Address Translatio
9090
9191
#### Create a SNAT rule
9292

93-
1. In your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
93+
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
9494
1. Locate your NSX Manager URL and credentials.
9595
1. Sign in to VMware NSX Manager.
9696
1. Go to **NAT Rules**.
@@ -116,7 +116,8 @@ For more information on NSX-T Data Center NAT configuration and options, see the
116116

117117
You can create a No-NAT or No-SNAT rule in NSX Manager to exclude certain matches from performing NAT. This policy can be used to allow private IP address traffic to bypass existing network translation rules.
118118

119-
1. In your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
119+
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
120+
1. Locate your NSX Manager URL and credentials.
120121
1. Sign in to NSX Manager, and then select **NAT Rules**.
121122
1. Select the T1 router, and then select **Add NAT Rule**.
122123
1. Select **No SNAT** rule as the type of NAT rule.
@@ -129,7 +130,8 @@ A Destination Network Translation (DNAT) service is used to expose a VM on a spe
129130

130131
#### Create a DNAT rule
131132

132-
1. In your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
133+
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
134+
1. Locate your NSX Manager URL and credentials.
133135
1. Sign in to NSX Manager, and then select **NAT Rules**.
134136
1. Select the T1 router, and then select **Add DNAT Rule**.
135137
1. Enter a name for the rule.
@@ -147,6 +149,7 @@ The VM is now exposed to the internet on the specific public IP address or on sp
147149
You can provide security protection for your network traffic in and out of the public internet through your gateway firewall.
148150

149151
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
152+
1. Locate your NSX Manager URL and credentials.
150153
1. Sign in to NSX Manager.
151154
1. On the NSX-T overview page, select **Gateway Policies**.
152155
1. Select **Gateway Specific Rules**, choose the T1 gateway, and then select **Add Policy**.

0 commit comments

Comments
 (0)