Skip to content

Commit e1cacb8

Browse files
committed
modification for private subnets, modification for secondary configs
1 parent 6127036 commit e1cacb8

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/load-balancer/load-balancer-floating-ip.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ sudo ufw allow 80/tcp
145145
```
146146
</details>
147147

148-
## <a name = "limitations"></a>Limitations
148+
## <a name = "limitations"></a>Limitations
149149

150150
- With Floating IP enabled on a load balancing rule, your application must use the primary IP configuration of the network interface for outbound.
151151
- If your application binds to the frontend IP address configured on the loopback interface in the guest OS, Azure's outbound won't rewrite the outbound flow, and the flow fails. Review [outbound scenarios](load-balancer-outbound-connections.md).

articles/virtual-network/ip-services/default-outbound-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ There are multiple ways to turn off default outbound access. The following secti
109109
>[!Important]
110110
> When a load balancer backend pool is configured by IP address, it will use default outbound access due to an ongoing known issue. For secure by default configuration and applications with demanding outbound needs, associate a NAT gateway to the VMs in your load balancer's backend pool to secure traffic. See more on existing [known issues](../../load-balancer/whats-new.md#known-issues).
111111
112-
## If I need outbound access, what is the recommended way?
112+
## If I need outbound access, what is the recommended way?
113113

114114
NAT gateway is the recommended approach to have explicit outbound connectivity. A firewall can also be used to provide this access.
115115

0 commit comments

Comments
 (0)