Skip to content

Commit e4cf454

Browse files
committed
introduce section for no-nat rule
1 parent f016c7d commit e4cf454

File tree

4 files changed

+30
-2
lines changed

4 files changed

+30
-2
lines changed

articles/azure-vmware/enable-public-ip-nsx-edge.md

Lines changed: 30 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enable Public IP to the NSX Edge for Azure VMware Solution (Preview)
33
description: This article shows how to enable internet access for your Azure VMware Solution.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 05/12/2022
6+
ms.date: 07/21/2022
77
---
88

99
# Enable Public IP to the NSX Edge for Azure VMware Solution (Preview)
@@ -62,6 +62,18 @@ There are three options for configuring your reserved Public IP down to the NSX
6262

6363
A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT) is used to allow many VMs to one SNAT service. This connection means you can provide Internet connectivity for many VMs.
6464

65+
66+
67+
>[!Note]
68+
> To enable SNAT for your specified address ranges, you must [configure a gateway firewall rule](#gateway-firewall-used-to-filter-traffic-to-vms-at-t1-gateways).
69+
70+
>[!Note]
71+
> Creating the following SNAT rules enables addresses ranges specified in the source. If you don't want SNAT enabled for specific address ranges, create a [No-NAT rule for the address ranges](#no-nat-rule-for-specific-address-ranges) to exclude the specified address range. For this functionality to work as expected, make the No-NAT rule a higher priority than the SNAT rule .
72+
73+
74+
75+
76+
6577
**Add rule**
6678
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**
6779
2. Locate your NSX-T URL and credentials.
@@ -81,6 +93,22 @@ A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT)
8193

8294
Logging can be enabled by way of the logging slider. For more information on NSX-T NAT configuration and options, see the
8395
[NSX-T NAT Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-7AD2C384-4303-4D6C-A44A-DEF45AA18A92.html)
96+
97+
## No-NAT rule for specific address ranges
98+
99+
A No-NAT rule can be used to exclude certain matches from performing Network Address Translation. This can be used to allow private IP traffic to bypass the NAT rule.
100+
101+
1. Navigate to NAT Rules.
102+
1. Select the T1 Router, and then select **ADD NAT RULE**.
103+
1. Configure the rule.
104+
1. Enter the name, then select No SNAT.
105+
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-3nat-rules.png" alt-text="Diagram that shows how to add a no-Nat rule to exclude certain matches." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png":::
106+
1. Enter the match criteria.
107+
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-add-nat-rule.png" alt-text="Diagram that shows how to add a T1 router to a Nat rule." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png":::
108+
1. Select **SAVE**.
109+
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-save-no-nat.png" alt-text="Diagram that shows how to add a T1 router to a Nat rule." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png":::
110+
111+
84112
### Inbound Internet Access for VMs
85113
A Destination Network Translation Service (DNAT) is used to expose a VM on a specific Public IP address and/or a specific port. This service provides inbound internet access to your workload VMs.
86114

@@ -101,7 +129,7 @@ The VM is now exposed to the internet on the specific Public IP and/or specific
101129

102130
### Gateway Firewall used to filter traffic to VMs at T1 Gateways
103131

104-
You can provide security protection for your network traffic in and out of the public Internet through your Gateway Firewall.
132+
You can provide security protection for your network traffic in and out of the public internet through your Gateway Firewall.
105133
1. From your Azure VMware Solution Private Cloud, select **VMware credentials**
106134
2. Locate your NSX-T URL and credentials.
107135
3. Log in to **VMware NSX-T**.
16 KB
Loading
7.3 KB
Loading
97.7 KB
Loading

0 commit comments

Comments
 (0)