Skip to content

Commit d641592

Browse files
committed
Updated images
1 parent e4cf454 commit d641592

File tree

3 files changed

+15
-23
lines changed

3 files changed

+15
-23
lines changed

articles/azure-vmware/enable-public-ip-nsx-edge.md

Lines changed: 15 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -62,50 +62,42 @@ There are three options for configuring your reserved Public IP down to the NSX
6262

6363
A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT) is used to allow many VMs to one SNAT service. This connection means you can provide Internet connectivity for many VMs.
6464

65-
66-
6765
>[!Note]
68-
> To enable SNAT for your specified address ranges, you must [configure a gateway firewall rule](#gateway-firewall-used-to-filter-traffic-to-vms-at-t1-gateways).
69-
70-
>[!Note]
71-
> Creating the following SNAT rules enables addresses ranges specified in the source. If you don't want SNAT enabled for specific address ranges, create a [No-NAT rule for the address ranges](#no-nat-rule-for-specific-address-ranges) to exclude the specified address range. For this functionality to work as expected, make the No-NAT rule a higher priority than the SNAT rule .
72-
73-
74-
75-
66+
> To enable SNAT for your specified address ranges, you must [configure a gateway firewall rule](#gateway-firewall-used-to-filter-traffic-to-vms-at-t1-gateways). Creating a SNAT rule enables specified address ranges in the source. If you don't want SNAT enabled for specific address ranges, create a [No-NAT rule for the address ranges](#no-nat-rule-for-specific-address-ranges) to exclude the specified address range. For this functionality to work as expected, make the No-NAT rule a higher priority than the SNAT rule.
7667
7768
**Add rule**
7869
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**
7970
2. Locate your NSX-T URL and credentials.
8071
3. Log in to **VMWare NSX-T**.
8172
4. Navigate to **NAT Rules**.
8273
5. Select the T1 Router.
83-
1. select **ADD NAT RULE**.
74+
1. Select **ADD NAT RULE**.
8475

8576
**Configure rule**
8677

8778
1. Enter a name.
8879
1. Select **SNAT**.
89-
1. Optionally enter a source such as a subnet to SNAT or destination.
80+
1. Optionally, enter a source such as a subnet to SNAT or destination.
9081
1. Enter the translated IP. This IP is from the range of Public IPs you reserved from the Azure VMware Solution Portal.
91-
1. Optionally give the rule a higher priority number. This prioritization will move the rule further down the rule list to ensure more specific rules are matched first.
82+
1. Optionally, give the rule a higher priority number. This prioritization will move the rule further down the rule list to ensure more specific rules are matched first.
9283
1. Click **SAVE**.
9384

9485
Logging can be enabled by way of the logging slider. For more information on NSX-T NAT configuration and options, see the
9586
[NSX-T NAT Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-7AD2C384-4303-4D6C-A44A-DEF45AA18A92.html)
9687

97-
## No-NAT rule for specific address ranges
88+
## No NAT rule for specific address ranges
9889

99-
A No-NAT rule can be used to exclude certain matches from performing Network Address Translation. This can be used to allow private IP traffic to bypass the NAT rule.
90+
A No NAT rule can be used to exclude certain matches from performing Network Address Translation. This policy can be used to allow private IP traffic to bypass the NAT rule.
91+
92+
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**
93+
2. Locate your NSX-T URL and credentials.
94+
3. Log in to **VMWare NSX-T** and then select **3 NAT Rules**.
95+
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-3nat-rules.png" alt-text="Diagram that shows how to add a No Nat rule to exclude certain matches." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png":::
10096

101-
1. Navigate to NAT Rules.
102-
1. Select the T1 Router, and then select **ADD NAT RULE**.
103-
1. Configure the rule.
104-
1. Enter the name, then select No SNAT.
105-
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-3nat-rules.png" alt-text="Diagram that shows how to add a no-Nat rule to exclude certain matches." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png":::
106-
1. Enter the match criteria.
107-
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-add-nat-rule.png" alt-text="Diagram that shows how to add a T1 router to a Nat rule." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png":::
108-
1. Select **SAVE**.
97+
1. Select the T1 Router and then select **ADD NAT RULE**.
98+
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-add-nat-rule.png" alt-text="Diagram that shows how to add a T1 router to a Nat rule." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png":::
99+
100+
1. Select **SAVE**.
109101
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-save-no-nat.png" alt-text="Diagram that shows how to add a T1 router to a Nat rule." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png":::
110102

111103

22.7 KB
Loading
33.2 KB
Loading

0 commit comments

Comments
 (0)