You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/nat-gateway/nat-overview.md
+24-60Lines changed: 24 additions & 60 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,87 +14,51 @@ ms.author: allensu
14
14
---
15
15
# What is Virtual Network NAT?
16
16
17
-
Virtual Network NAT (network address translation) simplifies outbound-only Internet connectivity for virtual networks. When configured on a subnet, all outbound connectivity uses your specified static public IP addresses. Outbound connectivity is possible without load balancer or public IP addresses directly attached to virtual machines. NAT is fully managed and highly resilient.
17
+
Virtual Network NAT is a fully managed and highly resilient Network Address Translation (NAT) service. VNet NAT simplifies outbound Internet connectivity for virtual networks. When configured on a subnet, all outbound connectivity uses the VNet NAT's static public IP addresses.
18
18
19
19
:::image type="content" source="./media/nat-overview/flow-map.png" alt-text="Figure shows a NAT receiving traffic from internal subnets and directing it to a public IP (PIP) and an IP prefix.":::
20
20
21
21
*Figure: Virtual Network NAT*
22
-
## Static IP addresses for outbound-only
23
22
24
-
Outbound connectivity can be defined for each subnet with NAT. Multiple subnets within the same virtual network can have different NATs. A subnet is configured by specifying which NAT gateway resource to use. All UDP and TCP outbound flows from any virtual machine instance will use NAT.
23
+
## VNet NAT benefits
25
24
26
-
NAT is compatible with standard SKU public IP address resources or public IP prefix resources or a combination of both. You can use a public IP prefix directly or distribute the public IP addresses of the prefix across multiple NAT gateway resources. NAT will groom all traffic to the range of IP addresses of the prefix. Any IP filtering of your deployments is now easy.
25
+
### Security
26
+
With NAT, individual VMs (or other compute resources) do not need public IP addresses and can remain fully private. Such resources without a public IP address can still reach external sources outside the VNet. You can also associate a Public IP Prefix to ensure that a contiguous set of IPs will be used for outbound. Destination firewall rules can be then configured based on this predictable IP list.
27
27
28
-
All outbound traffic for the subnet is processed by NAT automatically without any customer configuration. User-defined routes aren't necessary. NAT takes precedence over other outbound scenarios and replaces the default Internet destination of a subnet.
28
+
### Resiliency
29
+
NAT is a fully managed and distributed service. It doesn't depend on any individual compute instances such as VMs or a single physical gateway device. It leverages software defined networking making it highly resilient.
29
30
30
-
## On-demand SNAT with multiple IP addresses for scale
31
+
### Scalability
32
+
NAT can be associated to a subnet and can be used by all compute resources in that subnet. Further, all subnets in a VNet can leverage the same resource. When associated to a Public Ip Prefix, it will automatically scale to the number of IP addresses needed for outbound.
31
33
32
-
NAT uses "port network address translation" (PNAT or PAT) and is recommended for most workloads. Dynamic or divergent workloads can be easily accommodated with on-demand outbound flow allocation. Extensive pre-planning, pre-allocation, and ultimately overprovisioning of outbound resources is avoided. SNAT port resources are shared and available across all subnets using a specific NAT gateway resource and are provided when needed.
34
+
### Performance
35
+
NAT will not impact the network bandwidth of your compute resources since it is a software defined networking service. Learn more about [NAT gateway's performance](nat-gateway-resource.md#performance).
33
36
34
-
A public IP address attached to NAT provides up to 64,000 concurrent flows for UDP and TCP respectively.
35
37
36
-
A NAT gateway resource can use a:
38
+
## VNet NAT basics
37
39
38
-
* Public IP
39
-
* Public IP prefix
40
-
41
-
Both types can be associated to a NAT gateway.
42
-
43
-
Use a single IP address and scale up to 16 IP addresses.
44
-
45
-
Subnets in a virtual network are associated with a NAT gateway to enable outbound connections. A NAT gateway will use all IP addresses associated with the resource for the connections.
46
-
47
-
NAT gateway allows flows to be created from the virtual network to the Internet. Return traffic from the Internet is only allowed in response to an active flow.
48
-
49
-
Unlike load balancer outbound SNAT, NAT gateway has no restrictions on which private IP of a virtual machine instance can make outbound connections. Primary and secondary IPs can create outbound connections with NAT.
50
-
51
-
## Coexistence of inbound and outbound
52
-
53
-
NAT is compatible with the following standard SKU resources:
54
-
55
-
- Load balancer
56
-
- Public IP address
57
-
- Public IP prefix
58
-
59
-
When used together with NAT, these resources provide inbound Internet connectivity to your subnet(s). NAT provides all outbound Internet connectivity from your subnet(s).
60
-
61
-
NAT and compatible Standard SKU features are aware of the direction the flow was started. Inbound and outbound scenarios can coexist. These scenarios will receive the correct network address translations because these features are aware of the flow direction.
62
-
63
-
:::image type="content" source="./media/nat-overview/flow-direction4.png" alt-text="Figure shows a NAT gateway that supports outbound traffic to the internet from a virtual network.":::
64
-
65
-
*Figure: Virtual Network NAT flow direction*
66
-
## Fully managed, highly resilient
40
+
NAT can be created in a specific Availability Zone and has redundancy built in within the specified zone. NAT is non zonal by default. When creating [availability zones](../../availability-zones/az-overview.md) scenarios, NAT can be isolated in a specific zone. This is known as a zonal deployment.
67
41
68
42
NAT is fully scaled out from the start. There's no ramp up or scale-out operation required. Azure manages the operation of NAT for you. NAT always has multiple fault domains and can sustain multiple failures without service outage.
69
-
## TCP Reset for unrecognized flows
70
43
71
-
The private side of NAT sends TCP Reset packets for attempts to communicate on a TCP connection that doesn't exist. One example is connections that have reached idle timeout. The next packet received will return a TCP Reset to the private IP address to signal and force connection closure.
44
+
* Outbound connectivity can be defined for each subnet with NAT. Multiple subnets within the same virtual network can have different NATs. A subnet is configured by specifying which NAT gateway resource to use. All outbound traffic for the subnet is processed by NAT automatically without any customer configuration. User-defined routes aren't necessary. NAT takes precedence over other outbound scenarios and replaces the default Internet destination of a subnet.
45
+
* NAT supports TCP and UDP protocols only. ICMP is not supported.
46
+
* A NAT gateway resource can use a:
72
47
73
-
The public side of NAT doesn't generate TCP Reset packets or any other traffic. Only traffic produced by the customer's virtual network is emitted.
74
-
75
-
## Configurable TCP idle timeout
76
-
77
-
A default TCP idle timeout of 4 minutes is used and can be increased to up to 120 minutes. Any activity on a flow can also reset the idle timer, including TCP keepalives.
78
-
79
-
## Non-zonal or zonal with availability zones
80
-
81
-
NAT is non zonal by default. When creating [availability zones](../../availability-zones/az-overview.md) scenarios, NAT can be isolated in a specific zone. This is known as a zonal deployment.
82
-
83
-
:::image type="content" source="./media/nat-overview/az-directions.png" alt-text="Figure shows three zonal stacks, each of which contains a NAT gateway and a subnet.":::
84
-
85
-
*Figure: Virtual Network NAT with availability zones*
48
+
* Public IP
49
+
* Public IP prefix
50
+
* NAT is compatible with Standard SKU public IP address or public IP prefix resources or a combination of both. You can use a public IP prefix directly or distribute the public IP addresses of the prefix across multiple NAT gateway resources. NAT will groom all traffic to the range of IP addresses of the prefix. Basic resources, such as Basic Load Balancer or Basic Public IP aren't compatible with NAT. Basic resources must be placed on a subnet associated to a NAT Gateway.
51
+
* NAT cannot be associated to an IPv6 Public IP address or IPv6 Public IP Prefix. However, it can be associated to a dual stack subnet.
52
+
* NAT allows flows to be created from the virtual network to the services outside your VNet. Return traffic from the Internet is only allowed in response to an active flow. Services outside your VNet cannot initiate a connection to instances.
53
+
* NAT can't span multiple virtual networks.
54
+
* NAT cannot be deployed in a [Gateway Subnet](../../vpn-gateway/vpn-gateway-about-vpn-gateway-settings.md#gwsub)
55
+
* The private side of NAT (virtual machine instances or other compute resources) sends TCP Reset packets for attempts to communicate on a TCP connection that doesn't exist. One example is connections that have reached idle timeout. The next packet received will return a TCP Reset to the private IP address to signal and force connection closure. The public side of NAT doesn't generate TCP Reset packets or any other traffic. Only traffic produced by the customer's virtual network is emitted.
56
+
* A default TCP idle timeout of 4 minutes is used and can be increased to up to 120 minutes. Any activity on a flow can also reset the idle timer, including TCP keepalives.
86
57
87
58
## Pricing and SLA
88
59
89
60
For pricing details, see [Virtual Network pricing](https://azure.microsoft.com/pricing/details/virtual-network). NAT data path is at least 99.9% available.
90
61
91
-
## Limitations
92
-
93
-
* NAT is compatible with standard SKU public IP, public IP prefix, and load balancer resources. Basic resources, such as Basic Load Balancer or Basic Public IP aren't compatible with NAT. Basic resources must be placed on a subnet associated to a NAT Gateway.
94
-
* NAT cannot be associated to an IPv6 sPublic IP address or IPv6 Public IP Prefix t. However, it can be associated to a dual stack subnet.
95
-
* NAT can't span multiple virtual networks.
96
-
* NAT cannot be deployed in a [Gateway Subnet](../../vpn-gateway/vpn-gateway-about-vpn-gateway-settings.md#gwsub)
97
-
98
62
## Next steps
99
63
100
64
* Learn [how to get better outbound connectivity using an Azure NAT Gateway](https://www.youtube.com/watch?v=2Ng_uM0ZaB4).
Copy file name to clipboardExpand all lines: articles/virtual-network/nat-gateway/troubleshoot-nat.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,7 +173,7 @@ _**Solution:**_
173
173
174
174
### IPv6 coexistence
175
175
176
-
[Virtual Network NAT](nat-overview.md) supports IPv4 UDP and TCP protocols and deployment on a [subnet with an IPv6 prefix isn't supported](nat-overview.md#limitations).
176
+
[Virtual Network NAT](nat-overview.md) supports IPv4 UDP and TCP protocols and deployment on a subnet with an IPv6 prefix isn't supported.
177
177
178
178
_**Solution:**_ Deploy NAT gateway on a subnet without IPv6 prefix.
179
179
@@ -196,4 +196,4 @@ If you are still having trouble, open a support case for further troubleshooting
196
196
* Learn about [Virtual Network NAT](nat-overview.md)
197
197
* Learn about [NAT gateway resource](nat-gateway-resource.md)
198
198
* Learn about [metrics and alerts for NAT gateway resources](nat-metrics.md).
199
-
*[Tell us what to build next for Virtual Network NAT in UserVoice](https://aka.ms/natuservoice).
199
+
*[Tell us what to build next for Virtual Network NAT in UserVoice](https://aka.ms/natuservoice).
0 commit comments