Skip to content

Commit d2c4dca

Browse files
authored
Merge pull request #288524 from cherylmc/SFI-10
SFI update
2 parents 0428247 + da67352 commit d2c4dca

File tree

8 files changed

+18
-18
lines changed

8 files changed

+18
-18
lines changed

articles/vpn-gateway/bgp-howto.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure BGP for Azure VPN Gateway using the Azure po
55
author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.topic: how-to
8-
ms.date: 04/20/2023
8+
ms.date: 10/16/2024
99
ms.author: cherylmc
1010

1111
---
@@ -125,7 +125,7 @@ Before proceeding, make sure you have enabled BGP for the VPN gateway.
125125
Configure a local network gateway with BGP settings.
126126

127127
* For information and steps, see the [local network gateway](tutorial-site-to-site-portal.md#LocalNetworkGateway) section in the site-to-site connection article.
128-
* If you already have a local network gateway, you can modify it.To modify a local network gateway, go to the local network gateway resource **Configuration** page and make any necessary changes.
128+
* If you already have a local network gateway, you can modify it. To modify a local network gateway, go to the local network gateway resource **Configuration** page and make any necessary changes.
129129

130130
1. When you create the local network gateway, for this exercise, use the following values:
131131

9.86 KB
Loading
5.14 KB
Loading
-1.26 KB
Loading
23.1 KB
Loading

articles/vpn-gateway/nat-howto.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure NAT for Azure VPN Gateway.
55
author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.topic: how-to
8-
ms.date: 10/15/2024
8+
ms.date: 10/16/2024
99
ms.author: cherylmc
1010

1111
---
@@ -71,9 +71,9 @@ Before you create connections, you must create and save NAT rules on the VPN gat
7171

7272
| Name | Type | Mode | Internal | External | Connection |
7373
| --- | --- | --- | --- | --- | --- |
74-
| VNet | Static | EgressSNAT | 10.0.1.0/24 | 100.0.1.0/24 | Both connections |
75-
| Branch1 | Static | IngressSNAT | 10.0.1.0/24 | 100.0.2.0/24 | Branch1 connection |
76-
| Branch2 | Static | IngressSNAT | 10.0.1.0/24 | 100.0.3.0/24 | Branch2 connection |
74+
| VNet | Static | EgressSNAT | 10.0.1.0/24 | 192.168.1.0/24 | Both connections |
75+
| Branch1 | Static | IngressSNAT | 10.0.1.0/24 | 192.168.2.0/24| Branch1 connection |
76+
| Branch2 | Static | IngressSNAT | 10.0.1.0/24 | 192.168.3.0/24 | Branch2 connection |
7777

7878
Use the following steps to create all the NAT rules on the VPN gateway. If you're using BGP, select **Enable** for the Enable Bgp Route Translation setting.
7979

articles/vpn-gateway/nat-overview.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn about NAT (Network Address Translation) in Azure VPN to conne
55
author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.topic: conceptual
8-
ms.date: 05/02/2023
8+
ms.date: 10/16/2024
99
ms.author: cherylmc
1010
ms.custom: template-concept
1111
---
@@ -80,11 +80,11 @@ The following diagram shows an example of Azure VPN NAT configurations:
8080

8181
The diagram shows an Azure VNet and two on-premises networks, all with address space of 10.0.1.0/24. To connect these two networks to the Azure VNet and VPN gateway, create the following rules:
8282

83-
* IngressSNAT rule 1: This rule translates the on-premises address space 10.0.1.0/24 to 100.0.2.0/24.
83+
* IngressSNAT rule 1: This rule translates the on-premises address space 10.0.1.0/24 192.168.2.0/24.
8484

85-
* IngressSNAT rule 2: This rule translates the on-premises address space 10.0.1.0/24 to 100.0.3.0/24.
85+
* IngressSNAT rule 2: This rule translates the on-premises address space 10.0.1.0/24 to 192.168.3.0/24.
8686

87-
* EgressSNAT rule 1: This rule translates the VNet address space 10.0.1.0/24 to 100.0.1.0/24.
87+
* EgressSNAT rule 1: This rule translates the VNet address space 10.0.1.0/24 to 192.168.1.0/24.
8888

8989
In the diagram, each connection resource has the following rules:
9090

@@ -98,11 +98,11 @@ In the diagram, each connection resource has the following rules:
9898

9999
Based on the rules associated with the connections, here are the address spaces for each network:
100100

101-
| Network | Original | Translated |
102-
| --- | --- | --- |
103-
| VNet | 10.0.1.0/24 | 100.0.1.0/24 |
104-
| Branch 1 | 10.0.1.0/24 | 100.0.2.0/24 |
105-
| Branch 2 | 10.0.1.0/24 | 100.0.3.0/24 |
101+
| Network | Original | Translated |
102+
| --- | --- | --- |
103+
| VNet | 10.0.1.0/24 | 192.168.1.0/24 |
104+
| Branch 1 | 10.0.1.0/24 | 192.168.2.0/24 |
105+
| Branch 2 | 10.0.1.0/24 | 192.168.3.0/24 |
106106

107107
The following diagram shows an IP packet from Branch 1 to VNet, before and after the NAT translation:
108108

includes/vpn-gateway-faq-nat-include.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: cherylmc
33
ms.service: azure-vpn-gateway
44
ms.topic: include
5-
ms.date: 01/23/2024
5+
ms.date: 10/16/2024
66
ms.author: cherylmc
77
---
88
### Is NAT supported on all Azure VPN Gateway SKUs?
@@ -57,8 +57,8 @@ In either case, you don't need destination network address translation (DNAT) ru
5757

5858
You need to create one NAT rule for each prefix, because each NAT rule can include only one address prefix for NAT. For example, if the address space for the local network gateway consists of 10.0.1.0/24 and 10.0.2.0/25, you can create two rules:
5959

60-
* **IngressSNAT** rule 1: Map 10.0.1.0/24 to 100.0.1.0/24.
61-
* **IngressSNAT** rule 2: Map 10.0.2.0/25 to 100.0.2.0/25.
60+
* **IngressSNAT** rule 1: Map 10.0.1.0/24 to 192.168.1.0/24.
61+
* **IngressSNAT** rule 2: Map 10.0.2.0/25 to 192.168.2.0/25.
6262

6363
The two rules must match the prefix lengths of the corresponding address prefixes. The same guideline applies to **EgressSNAT** rules for the VNet address space.
6464

0 commit comments

Comments
 (0)