You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/native-internet-connectivity-design-considerations.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Azure VMware Solution in an Azure Virtual Network Internet connectivity design consideration (Public preview)
3
-
description: Learn about Azure VMware Solution in an Azure Virtual Network Internet connectivity design consideration.
2
+
title: Internet Configuration for Azure VMware Solution Generation 2 Private Clouds
3
+
description: Learn about Azure VMware Solution in an Azure Virtual Network Internet connectivity configuration.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
6
ms.date: 3/28/2025
@@ -9,22 +9,22 @@ ms.custom: engagement-fy25
9
9
10
10
# Connect to Internet
11
11
12
-
After you deploy Azure VMware Solution in an Azure Virtual Network, you may require network connectivity between the private cloud and other networks you have in an Azure Virtual Network, on-premises, other Azure VMware Solution private clouds, or the internet. In this article, you learn to connect Azure VMware Solution on an Azure Virtual Network private cloud to the internet.
12
+
After you deploy an Azure VMware Solution Generation (Gen) 2 private cloud, you may require network connectivity between the private cloud and other networks you have in an Azure Virtual Network, on-premises, other Azure VMware Solution private clouds, or the internet. In this article, you learn to connect Azure VMware Solution on an Azure Virtual Network private cloud to the internet.
13
13
14
14
## Prerequisites
15
-
-Azure VMware Solution private cloud in an Azure Virtual Network deployed successfully.
15
+
-Gen 2 private cloud deployed successfully.
16
16
- Azure Firewall or a third-party Network Virtual Appliance (NVA) deployed in the virtual network which will be used as an internet ingress/egress appliance.
17
17
- Azure route table with a default route pointing to the Azure Firewall or Network Virtual Appliance.
18
18
19
-
## Connect Azure VMware Solution in an Azure Virtual Network private cloud to the Internet
19
+
## Connect Azure VMware Solution Generation 2 Private Cloud to the Internet
20
20
21
21
Azure VMware Solution provides necessary internet connectivity to SDDC appliances like vCenter, NSX Manager, and HCX Manager for management functions. This private cloud relies on the internet connectivity configured on the Virtual Network it's deployed in. The customer workload can connect to the internet through either virtual WAN, Azure Firewall, or third-party Network Virtual Appliances. The standard Azure Supported topology for virtual WAN, Azure Firewall, and third-party Network Virtual Appliances are supported.
22
22
23
23
:::image type="content" source="./media/native-connectivity/native-connect-private-cloud-internet.png" alt-text="Diagram showing an Azure VMware Solution connection to other virtual networks." lightbox="media/native-connectivity/native-connect-private-cloud-internet.png":::
24
24
25
-
Azure VMware Solution internet connectivity using Azure Firewall is similar to the way Azure virtual network internet connectivity is achieved, which is described in more detail in the Azure Firewall documentation. The only thing specific to the Azure VMware solution is the subnets which need to be associated with a user-defined route table (UDR) to point to Azure Firewall or third-party Network Virtual Appliance for internet connectivity.
25
+
Internet connectivity using Azure Firewall is similar to the way Azure virtual network internet connectivity is achieved, which is described in more detail in the Azure Firewall documentation. The only thing specific to the Azure VMware solution is the subnets which need to be associated with a user-defined route table (UDR) to point to Azure Firewall or third-party Network Virtual Appliance for internet connectivity.
26
26
27
-
## Main steps:
27
+
## Steps:
28
28
29
29
1. Have or create Azure Firewall or a third-party Network Virtual Appliance in the virtual network local to the private cloud or in the peered virtual network.
30
30
2. Define an Azure route table with a 0.0.0.0/0 route pointing to the next-hop type Virtual Appliance with the next-hop IP address of the Azure Firewall private IP or IP of the Network Virtual Appliance.
0 commit comments