Skip to content

Commit d26b2b0

Browse files
Merge pull request #295740 from wtnlee/somefixes
some sfi fixes
2 parents d900b72 + eb43c3a commit d26b2b0

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

articles/virtual-wan/how-to-network-virtual-appliance-inbound.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,6 @@ The following table describes known issues related to the internet inbound/DNAT
7070
|Issue | Description| Mitigation|
7171
|--|--|--|
7272
| DNAT traffic isn't forwarded to the NVA after associating an additional IP address.| After associating additional IP address(es) to an NVA that already has active inbound security rules, DNAT traffic isn't forwarded properly to the NVA due to a code defect. | Use partner orchestration/management software to modify (create or delete existing) configured inbound-security rules to restore connectivity. |
73-
|Inbound security rule configuration scalability| Inbound security rule configuration might fail when a large number (approximately 100) rules are configured.| No mitigation, reach out to Azure Support for fix timelines.|
7473

7574
### Limitations
7675

@@ -86,7 +85,7 @@ The following table describes known issues related to the internet inbound/DNAT
8685

8786
### Considerations
8887

89-
* Inbound Traffic is automatically load-balanced across all healthy instances of the Network Virtual Appliance.
88+
* Inbound traffic is automatically load-balanced across all healthy instances of the Network Virtual Appliance. Virtual WAN uses five-tuple hashing algorithm to distribute flows for backend NVA instances. For certain use cases such as File Transfer Protocol (FTP) where a single application session might have multiple five-tuple flows (e.g. FTP control and data plane packets on different ports), Virtual WAN does not guarantee that all flows in that session are distributed to the same NVA instance.
9089
* In most cases, NVAs must perform source-NAT to the Firewall private IP in addition to destination-NAT to ensure flow symmetry. Certain NVA types might not require source-NAT. Contact your NVA provider for best practices around source-NAT.
9190
* Timeout for idle flows is automatically set to 4 minutes.
9291
* You can assign individual IP address resources generated from an IP address prefix to the NVA as internet inbound IPs. Assign each IP address from the prefix individually.

articles/virtual-wan/roles-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ NVAs (Network Virtual Appliances) in Virtual WAN are typically deployed through
182182

183183
|Resource | Required Azure permissions due to resource references |
184184
|---|---|
185-
| networkVirtualAppliances | Microsoft.Network/virtualHubs/read |
185+
| networkVirtualAppliances | Microsoft.Network/virtualHubs/read <br? Microsoft.Network/publicIPAddresses/join|
186186
| networkVirtualAppliances/networkVirtualApplianceConnections | Microsoft.Network/virtualHubs/routeMaps/read <br>Microsoft.Network/virtualHubs/hubRouteTables/read |
187187

188188

0 commit comments

Comments
 (0)