Skip to content

Commit f448933

Browse files
committed
2025_01 - Fix monthly broken links - ankitaduttaMSFT
1 parent 035b7f2 commit f448933

5 files changed

+5
-5
lines changed

articles/site-recovery/hyper-v-prepare-on-premises-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ For this tutorial, the simplest configuration is for the Hyper-V hosts and the V
6565

6666
1. Make sure that Hyper-V hosts and the Virtual Machine Manager server, if relevant, can access the required URLs listed in the following table.
6767
1. If you're controlling access by IP address, make sure that:
68-
- IP address-based firewall rules can connect to [Azure Datacenter IP ranges](https://www.microsoft.com/download/confirmation.aspx?id=41653) and the HTTPS port (443).
68+
- IP address-based firewall rules can connect to [Azure Datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) and the HTTPS port (443).
6969
- Allow IP address ranges for the Azure region of your subscription.
7070

7171
### Required URLs

articles/site-recovery/physical-azure-disaster-recovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ Make sure the machine can access these URLs based on your environment:
133133

134134
IP address-based firewall rules should allow communication to all of the Azure URLs that are listed above over HTTPS (443) port. To simplify and limit the IP Ranges, it's recommended that URL filtering is done.
135135

136-
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/confirmation.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the Microsoft Entra ID, Backup, Replication, and Storage URLs.
136+
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the Microsoft Entra ID, Backup, Replication, and Storage URLs.
137137
- **Government IPs** - Allow the [Azure Government Datacenter IP Ranges](https://www.microsoft.com/en-us/download/details.aspx?id=57063), and the HTTPS (443) port for all USGov Regions (Virginia, Texas, Arizona, and Iowa) to support Microsoft Entra ID, Backup, Replication, and Storage URLs.
138138

139139
#### Run setup

articles/site-recovery/region-move-cross-geos.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ Make sure the machine can access these URLs based on your environment:
140140

141141
IP address-based firewall rules should allow communication to all of the Azure URLs that are listed above over HTTPS (443) port. To simplify and limit the IP Ranges, it is recommended that URL filtering is done.
142142

143-
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/confirmation.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the Microsoft Entra ID, Backup, Replication, and Storage URLs.
143+
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the Microsoft Entra ID, Backup, Replication, and Storage URLs.
144144
- **Government IPs** - Allow the [Azure Government Datacenter IP Ranges](https://www.microsoft.com/en-us/download/details.aspx?id=57063), and the HTTPS (443) port for all USGov Regions (Virginia, Texas, Arizona, and Iowa) to support Microsoft Entra ID, Backup, Replication, and Storage URLs.
145145

146146
#### Run setup

articles/site-recovery/vmware-azure-deploy-configuration-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Make sure the machine can access these URLs based on your environment:
111111

112112
IP address-based firewall rules should allow communication to all of the Azure URLs that are listed above over HTTPS (443) port. To simplify and limit the IP Ranges, it is recommended that URL filtering be done.
113113

114-
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/confirmation.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the Microsoft Entra ID, Backup, Replication, and Storage URLs.
114+
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the Microsoft Entra ID, Backup, Replication, and Storage URLs.
115115
- **Government IPs** - Allow the [Azure Government Datacenter IP Ranges](https://www.microsoft.com/en-us/download/details.aspx?id=57063), and the HTTPS (443) port for all USGov Regions (Virginia, Texas, Arizona, and Iowa) to support Microsoft Entra ID, Backup, Replication, and Storage URLs.
116116

117117
### Configure settings

includes/site-recovery-config-server-reqs-physical.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ IP address type | Static
3333
**ACCESS SETTINGS** |
3434
MYSQL | MySQL should be installed on the configuration server. You can install manually, or Site Recovery can install it during deployment. For Site Recovery to install, check that the machine can reach http://cdn.mysql.com/archives/mysql-5.5/mysql-5.5.37-win32.msi.
3535
URLs | The configuration server needs access to these URLs (directly or via proxy):<br/><br/> Microsoft Entra ID: `login.microsoftonline.com`; `login.microsoftonline.us`; `*.accesscontrol.windows.net`<br/><br/> Replication data transfer: `*.backup.windowsazure.com`; `*.backup.windowsazure.us`<br/><br/> Replication management: `*.hypervrecoverymanager.windowsazure.com`; `*.hypervrecoverymanager.windowsazure.us`; `https://management.azure.com`; `*.services.visualstudio.com`<br/><br/> Storage access: `*.blob.core.windows.net`; `*.blob.core.usgovcloudapi.net`<br/><br/> Time synchronization: `time.nist.gov`; `time.windows.com`<br/><br/> Telemetry (optional): `dc.services.visualstudio.com`
36-
Firewall | IP address-based firewall rules should allow communication to Azure URLs. To simplify and limit the IP ranges, we recommend using URL filtering.<br/><br/>**For commercial IPs:**<br/><br/>- Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/confirmation.aspx?id=41653), and the HTTPS (443) port.<br/><br/> - Allow IP address ranges for the West US (used for Access Control and Identity Management).<br/><br/> - Allow IP address ranges for the Azure region of your subscription, to support the URLs needed for Microsoft Entra ID, backup, replication, and storage.<br/><br/> **For government IPs:**<br/><br/> - Allow the Azure Government Datacenter IP Ranges, and the HTTPS (443) port.<br/><br/> - Allow IP address ranges for all US Gov Regions (Virginia, Texas, Arizona, and Iowa), to support the URLs needed for Microsoft Entra ID, backup, replication, and storage.
36+
Firewall | IP address-based firewall rules should allow communication to Azure URLs. To simplify and limit the IP ranges, we recommend using URL filtering.<br/><br/>**For commercial IPs:**<br/><br/>- Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653), and the HTTPS (443) port.<br/><br/> - Allow IP address ranges for the West US (used for Access Control and Identity Management).<br/><br/> - Allow IP address ranges for the Azure region of your subscription, to support the URLs needed for Microsoft Entra ID, backup, replication, and storage.<br/><br/> **For government IPs:**<br/><br/> - Allow the Azure Government Datacenter IP Ranges, and the HTTPS (443) port.<br/><br/> - Allow IP address ranges for all US Gov Regions (Virginia, Texas, Arizona, and Iowa), to support the URLs needed for Microsoft Entra ID, backup, replication, and storage.
3737
Ports | Allow 443 (Control channel orchestration)<br/><br/> Allow 9443 (Data transport)
3838

3939

0 commit comments

Comments
 (0)