Skip to content

Commit d4a909e

Browse files
Merge pull request #211211 from cherylmc/nva-hub
Update about-nva-hub.md
2 parents 0590cdd + d96a509 commit d4a909e

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

articles/virtual-wan/about-nva-hub.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,17 @@
22
title: 'About Network Virtual Appliances - Virtual WAN hub'
33
titleSuffix: Azure Virtual WAN
44
description: Learn about Network Virtual Appliances in a Virtual WAN hub.
5-
services: virtual-wan
65
author: wtnlee
76
ms.service: virtual-wan
87
ms.topic: conceptual
9-
ms.date: 06/02/2021
8+
ms.date: 09/14/2022
109
ms.author: wellee
1110
ms.custom: references_regions
1211
# Customer intent: As someone with a networking background, I want to learn about Network Virtual Appliances in a Virtual WAN hub.
1312
---
1413
# About NVAs in a Virtual WAN hub
1514

16-
Customers can deploy select Network Virtual Appliances (NVAs) directly into a Virtual WAN hub in a solution that is jointly managed by Microsoft Azure and third-party Network Virtual Appliance vendors. Not all Network Virtual Appliances in Azure Marketplace can be deployed into a Virtual WAN hub. For a full list of available partners, see the [Partners](#partner) section of this article.
15+
Customers can deploy select Network Virtual Appliances (NVAs) directly into a Virtual WAN hub in a solution that is jointly managed by Microsoft Azure and third-party Network Virtual Appliance vendors. Not all Network Virtual Appliances in Azure Marketplace can be deployed into a Virtual WAN hub. For a full list of available partners, see the [Partners](#partners) section of this article.
1716

1817
## Key benefits
1918

@@ -32,7 +31,7 @@ Deploying NVAs into a Virtual WAN hub provides the following benefits:
3231
> [!IMPORTANT]
3332
> To ensure you get the best support for this integrated solution, make sure you have similar levels of support entitlement with both Microsoft and your Network Virtual Appliance provider.
3433
35-
## <a name ="partner"></a> Partners
34+
## Partners
3635

3736
[!INCLUDE [NVA partners](../../includes/virtual-wan-nva-hub-partners.md)]
3837

@@ -56,7 +55,7 @@ Customers can deploy an Azure Firewall along side their connectivity-based NVAs.
5655

5756
Customers can also deploy NVAs into a Virtual WAN hub that perform both SD-WAN connectivity and Next-Generation Firewall capabilities. Customers can connect on-premises devices to the NVA in the hub and also use the same appliance to inspect all North-South, East-West, and Internet-bound traffic. Routing to enable these scenarios can be configured via [Routing Intent and Routing Policies](./how-to-routing-policies.md).
5857

59-
Partners that support these traffic flows are listed as **dual-role SD-WAN connectivity and security (Next-Generation Firewall) Network Virtual Appliances** in the [Partners section](#partner).
58+
Partners that support these traffic flows are listed as **dual-role SD-WAN connectivity and security (Next-Generation Firewall) Network Virtual Appliances** in the [Partners section](#partners).
6059

6160
:::image type="content" source="./media/about-nva-hub/global-transit-ngfw.png" alt-text="Global transit architecture with third-party NVA." lightbox="./media/about-nva-hub/global-transit-ngfw.png":::
6261

@@ -87,11 +86,11 @@ NVA Partners may create different resources depending on their appliance deploym
8786

8887
### Managed resource group permissions
8988

90-
By default, all managed resource groups have an deny-all Azure Active Directory assignment. Deny-all assignments prevent customers from calling write operations on any resources in the managed resource group, including Network Virtual Appliance resources.
89+
By default, all managed resource groups have a deny-all Azure Active Directory assignment. Deny-all assignments prevent customers from calling write operations on any resources in the managed resource group, including Network Virtual Appliance resources.
9190

9291
However, partners may create exceptions for specific actions that customers are allowed to perform on resources deployed in managed resource groups.
9392

94-
Permissions on resources in existing managed resource groups are not dynamically updated as new permitted actions are added by partners and require a manual refresh.
93+
Permissions on resources in existing managed resource groups aren't dynamically updated as new permitted actions are added by partners and require a manual refresh.
9594

9695
To refresh permissions on the managed resource groups, customers can leverage the [Refresh Permissions REST API ](/rest/api/managedapplications/applications/refresh-permissions).
9796

0 commit comments

Comments
 (0)