You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/automation/troubleshoot/desired-state-configuration.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ VM has reported a failure when processing extension 'Microsoft.Powershell.DSC /
107
107
108
108
### Cause
109
109
110
-
This issue is caused by a bad or expired certificate. For more information, see [Certificate expiration and reregistration](../automation-dsc-onboarding.md#certificate-expiration-and-re-registration).
110
+
This issue is caused by a bad or expired certificate. For more information, see [Certificate expiration and reregistration](../automation-dsc-onboarding.md#re-registering-a-node).
111
111
112
112
### Resolution
113
113
@@ -271,8 +271,8 @@ Treat the cross-subscription node as though it lives in a separate cloud, or on-
271
271
272
272
Follow the steps below to register the node.
273
273
274
-
* Windows - [Physical/virtual Windows machines on-premises, or in a cloud other than Azure/AWS](../automation-dsc-onboarding.md#physicalvirtual-windows-machines-on-premises-or-in-a-cloud-other-than-azure-including-aws-ec2-instances).
275
-
* Linux - [Physical/virtual Linux machines on-premises, or in a cloud other than Azure](../automation-dsc-onboarding.md#physicalvirtual-linux-machines-on-premises-or-in-a-cloud-other-than-azure).
274
+
* Windows - [Physical/virtual Windows machines on-premises, or in a cloud other than Azure/AWS](../automation-dsc-onboarding.md#onboarding-physicalvirtual-windows-machines-on-premises-or-in-a-cloud-other-than-azure-including-aws-ec2-instances).
275
+
* Linux - [Physical/virtual Linux machines on-premises, or in a cloud other than Azure](../automation-dsc-onboarding.md#onboarding-physicalvirtual-linux-machines-on-premises-or-in-a-cloud-other-than-azure).
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-architecture.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -137,7 +137,7 @@ If outbound access for VMs is controlled with URLs, allow these URLs.
137
137
### Outbound connectivity for IP address ranges
138
138
139
139
To control outbound connectivity for VMs using IP addresses, allow these addresses.
140
-
Please note that details of network connectivity requirements can be found in [networking white paper](azure-to-azure-about-networking.md#outbound-connectivity-for-ip-address-ranges)
140
+
Please note that details of network connectivity requirements can be found in [networking white paper](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags)
141
141
142
142
#### Source region rules
143
143
@@ -172,7 +172,7 @@ If you control VM connectivity by filtering network traffic to and from Azure ne
172
172
- Service tags represent a group of IP address prefixes gathered together to minimize complexity when creating security rules.
173
173
- Microsoft automatically updates service tags over time.
174
174
175
-
Learn more about [outbound connectivity](azure-to-azure-about-networking.md#outbound-connectivity-for-ip-address-ranges) for Site Recovery, and [controlling connectivity with NSGs](concepts-network-security-group-with-site-recovery.md).
175
+
Learn more about [outbound connectivity](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags) for Site Recovery, and [controlling connectivity with NSGs](concepts-network-security-group-with-site-recovery.md).
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-troubleshoot-network-connectivity.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ These rules are required so that replication can be enabled from the target regi
87
87
- Connection cannot be established to Azure Site Recovery service endpoints.
88
88
89
89
-**Resolution**
90
-
- Azure Site Recovery required access to [Site Recovery IP ranges](https://docs.microsoft.com/azure/site-recovery/azure-to-azure-about-networking#outbound-connectivity-for-ip-address-ranges) depending on the region. Make sure that required ip ranges are accessible from the virtual machine.
90
+
- Azure Site Recovery required access to [Site Recovery IP ranges](https://docs.microsoft.com/azure/site-recovery/azure-to-azure-about-networking#outbound-connectivity-using-service-tags) depending on the region. Make sure that required ip ranges are accessible from the virtual machine.
91
91
92
92
93
93
## Issue 4: A2A replication failed when the network traffic goes through on-premises proxy server (151072)
@@ -107,7 +107,7 @@ These rules are required so that replication can be enabled from the target regi
107
107
4. Azure Site Recovery Mobility Service agent supports only ***un-authenticated proxies***.
108
108
109
109
### Fix the problem
110
-
To allow [the required URLs](azure-to-azure-about-networking.md#outbound-connectivity-for-urls) or the [required IP ranges](azure-to-azure-about-networking.md#outbound-connectivity-for-ip-address-ranges), follow the steps in the [networking guidance document](site-recovery-azure-to-azure-networking-guidance.md).
110
+
To allow [the required URLs](azure-to-azure-about-networking.md#outbound-connectivity-for-urls) or the [required IP ranges](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags), follow the steps in the [networking guidance document](site-recovery-azure-to-azure-networking-guidance.md).
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-tutorial-enable-replication.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ If you're using a URL-based firewall proxy to control outbound connectivity, all
70
70
71
71
### Outbound connectivity for IP address ranges
72
72
73
-
If you're using a network security group (NSG), create service-tag based NSG rules for access to Azure Storage, Azure Active Directory, Site Recovery service, and Site Recovery monitoring. [Learn more](azure-to-azure-about-networking.md#outbound-connectivity-for-ip-address-ranges).
73
+
If you're using a network security group (NSG), create service-tag based NSG rules for access to Azure Storage, Azure Active Directory, Site Recovery service, and Site Recovery monitoring. [Learn more](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags).
Copy file name to clipboardExpand all lines: articles/site-recovery/concepts-network-security-group-with-site-recovery.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,12 +19,12 @@ This article describes how you can use Network Security Groups with Azure Site R
19
19
20
20
## Using Network Security Groups
21
21
22
-
An individual subnet can have zero, or one, associated NSG. An individual network interface can also have zero, or one, associated NSG. So, you can effectively have dual traffic restriction for a virtual machine by associating an NSG first to a subnet, and then another NSG to the VM’s network interface. The application of NSG rules in this case depends on the direction of traffic and priority of applied security rules.
22
+
An individual subnet can have zero, or one, associated NSG. An individual network interface can also have zero, or one, associated NSG. So, you can effectively have dual traffic restriction for a virtual machine by associating an NSG first to a subnet, and then another NSG to the VM's network interface. The application of NSG rules in this case depends on the direction of traffic and priority of applied security rules.
23
23
24
24
Consider a simple example with one virtual machine as follows:
25
-
-The virtual machine is placed inside the **Contoso Subnet**.
26
-
-**Contoso Subnet** is associated with **Subnet NSG**.
27
-
-The VM network interface is additionally associated with **VM NSG**.
25
+
-The virtual machine is placed inside the **Contoso Subnet**.
26
+
-**Contoso Subnet** is associated with **Subnet NSG**.
27
+
-The VM network interface is additionally associated with **VM NSG**.
28
28
29
29

30
30
@@ -40,34 +40,34 @@ You may not always be aware when network security groups are applied to both a n
40
40
41
41
Azure Site Recovery enables disaster recovery and migration to Azure for on-premises [Hyper-V virtual machines](hyper-v-azure-architecture.md), [VMware virtual machines](vmware-azure-architecture.md), and [physical servers](physical-azure-architecture.md). For all on-premises to Azure scenarios, replication data is sent to and stored in an Azure Storage account. During replication, you don't pay any virtual machine charges. When you run a failover to Azure, Site Recovery automatically creates Azure IaaS virtual machines.
42
42
43
-
Once VMs have been created after failover to Azure, NSGs can be used to limit network traffic to the virtual network and VMs. Site Recovery does not create NSGs as part of the failover operation. We recommend creating the required Azure NSGs before initiating failover. You can then associate NSGs to failed over VMs automatically during failover, using automation scripts with Site Recovery’s powerful [recovery plans](site-recovery-create-recovery-plans.md).
43
+
Once VMs have been created after failover to Azure, NSGs can be used to limit network traffic to the virtual network and VMs. Site Recovery does not create NSGs as part of the failover operation. We recommend creating the required Azure NSGs before initiating failover. You can then associate NSGs to failed over VMs automatically during failover, using automation scripts with Site Recovery's powerful [recovery plans](site-recovery-create-recovery-plans.md).
44
44
45
45
For example, if the post-failover VM configuration is similar to the [example scenario](concepts-network-security-group-with-site-recovery.md#using-network-security-groups) detailed above:
46
-
-You can create **Contoso VNet** and **Contoso Subnet** as part of DR planning on the target Azure region.
47
-
-You can also create and configure both **Subnet NSG** as well as **VM NSG** as part the same DR planning.
48
-
-**Subnet NSG** can then be immediately associated with **Contoso Subnet**, as both the NSG and the subnet are already available.
49
-
-**VM NSG** can be associated with VMs during failover using recovery plans.
46
+
-You can create **Contoso VNet** and **Contoso Subnet** as part of DR planning on the target Azure region.
47
+
-You can also create and configure both **Subnet NSG** as well as **VM NSG** as part the same DR planning.
48
+
-**Subnet NSG** can then be immediately associated with **Contoso Subnet**, as both the NSG and the subnet are already available.
49
+
-**VM NSG** can be associated with VMs during failover using recovery plans.
50
50
51
51
Once the NSGs are created and configured, we recommend running a [test failover](site-recovery-test-failover-to-azure.md) to verify scripted NSG associations and post-failover VM connectivity.
52
52
53
53
## Azure to Azure replication with NSG
54
54
55
55
Azure Site Recovery enables disaster recovery of [Azure virtual machines](azure-to-azure-architecture.md). When enabling replication for Azure VMs, Site Recovery can create the replica virtual networks (including subnets and gateway subnets) on the target region and create the required mappings between the source and target virtual networks. You can also pre-create the target side networks and subnets, and use the same while enabling replication. Site Recovery does not create any VMs on the target Azure region prior to [failover](azure-to-azure-tutorial-failover-failback.md).
56
56
57
-
For Azure VM replication, ensure that the NSG rules on the source Azure region allow [outbound connectivity](azure-to-azure-about-networking.md#outbound-connectivity-for-ip-address-ranges) for replication traffic. You can also test and verify these required rules through this [example NSG configuration](azure-to-azure-about-networking.md#example-nsg-configuration).
57
+
For Azure VM replication, ensure that the NSG rules on the source Azure region allow [outbound connectivity](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags) for replication traffic. You can also test and verify these required rules through this [example NSG configuration](azure-to-azure-about-networking.md#example-nsg-configuration).
58
58
59
-
Site Recovery does not create or replicate NSGs as part of the failover operation. We recommend creating the required NSGs on the target Azure region before initiating failover. You can then associate NSGs to failed over VMs automatically during failover, using automation scripts with Site Recovery’s powerful [recovery plans](site-recovery-create-recovery-plans.md).
59
+
Site Recovery does not create or replicate NSGs as part of the failover operation. We recommend creating the required NSGs on the target Azure region before initiating failover. You can then associate NSGs to failed over VMs automatically during failover, using automation scripts with Site Recovery's powerful [recovery plans](site-recovery-create-recovery-plans.md).
60
60
61
61
Considering the [example scenario](concepts-network-security-group-with-site-recovery.md#using-network-security-groups) described earlier:
62
-
-Site Recovery can create replicas of **Contoso VNet** and **Contoso Subnet** on the target Azure region when replication is enabled for the VM.
63
-
-You can create the desired replicas of **Subnet NSG** and **VM NSG** (named, for example, **Target Subnet NSG** and **Target VM NSG**, respectively) on the target Azure region, allowing for any additional rules required on the target region.
64
-
-**Target Subnet NSG** can then be immediately associated with the target region subnet, as both the NSG and the subnet are already available.
65
-
-**Target VM NSG** can be associated with VMs during failover using recovery plans.
62
+
-Site Recovery can create replicas of **Contoso VNet** and **Contoso Subnet** on the target Azure region when replication is enabled for the VM.
63
+
-You can create the desired replicas of **Subnet NSG** and **VM NSG** (named, for example, **Target Subnet NSG** and **Target VM NSG**, respectively) on the target Azure region, allowing for any additional rules required on the target region.
64
+
-**Target Subnet NSG** can then be immediately associated with the target region subnet, as both the NSG and the subnet are already available.
65
+
-**Target VM NSG** can be associated with VMs during failover using recovery plans.
66
66
67
67
Once the NSGs are created and configured, we recommend running a [test failover](azure-to-azure-tutorial-dr-drill.md) to verify scripted NSG associations and post-failover VM connectivity.
68
68
69
69
## Next steps
70
-
-Learn more about [Network Security Groups](../virtual-network/security-overview.md#network-security-groups).
71
-
-Learn more about NSG [security rules](../virtual-network/security-overview.md#security-rules).
72
-
-Learn more about [effective security rules](../virtual-network/diagnose-network-traffic-filter-problem.md) for an NSG.
73
-
-Learn more about [recovery plans](site-recovery-create-recovery-plans.md) to automate application failover.
70
+
-Learn more about [Network Security Groups](../virtual-network/security-overview.md#network-security-groups).
71
+
-Learn more about NSG [security rules](../virtual-network/security-overview.md#security-rules).
72
+
-Learn more about [effective security rules](../virtual-network/diagnose-network-traffic-filter-problem.md) for an NSG.
73
+
-Learn more about [recovery plans](site-recovery-create-recovery-plans.md) to automate application failover.
0 commit comments