Skip to content

Commit f8be8eb

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into instantRestore
2 parents bd91fd6 + 129eed5 commit f8be8eb

File tree

5 files changed

+22
-11
lines changed

5 files changed

+22
-11
lines changed

articles/aks/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -202,8 +202,6 @@
202202
href: ../migrate/tutorial-app-containerization-aspnet-kubernetes.md?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
203203
- name: Clusters
204204
items:
205-
- name: Create a cluster
206-
href: create-cluster.md
207205
- name: Deploy a cluster in an Edge Zone
208206
href: edge-zones.md
209207
- name: Cluster configuration options

articles/aks/breadcrumb/TOC.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,4 +40,16 @@
4040
topicHref: /azure/aks/index
4141
- name: Azure Kubernetes Service
4242
tocHref: /azure/storage/
43+
topicHref: /azure/aks/index
44+
- name: Azure Kubernetes Service
45+
tocHref: /azure/architecture/
46+
topicHref: /azure/aks/index
47+
- name: Azure Kubernetes Service
48+
tocHref: /azure/backup/
49+
topicHref: /azure/aks/index
50+
- name: Azure Kubernetes Service
51+
tocHref: /azure/security/
52+
topicHref: /azure/aks/index
53+
- name: Azure Kubernetes Service
54+
tocHref: /compliance/regulatory/
4355
topicHref: /azure/aks/index
79 KB
Loading
144 KB
Loading

articles/firewall/snat-private-range.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -177,9 +177,9 @@ You can use the Azure portal to specify private IP address ranges for the firewa
177177

178178
## Auto-learn SNAT routes (preview)
179179

180-
You can configure Azure Firewall to auto-learn both registered and private ranges every 30 minutes. These learned address ranges are considered to be internal to the network and hence traffic to destinations in the learned ranges aren't SNATed. Configure auto-learn SNAT ranges requires Azure Route Server to be deployed in the same VNet as the Azure Firewall. The Firewall must be associated with the Azure Route Server and configured to auto-learn SNAT ranges in the Azure Firewall Policy. You can currently use JSON, Azure PowerShell, or the Azure portal to configure auto-learn SNAT routes.
180+
You can configure Azure Firewall to auto-learn both registered and private ranges every 30 minutes. These learned address ranges are considered to be internal to the network, so traffic to destinations in the learned ranges aren't SNATed. Auto-learn SNAT ranges requires Azure Route Server to be deployed in the same VNet as the Azure Firewall. The firewall must be associated with the Azure Route Server and configured to auto-learn SNAT ranges in the Azure Firewall Policy. You can currently use an ARM template, Azure PowerShell, or the Azure portal to configure auto-learn SNAT routes.
181181

182-
### Configure using JSON
182+
### Configure using an ARM template
183183

184184
You can use the following JSON to configure auto-learn. Azure Firewall must be associated with an Azure Route Server.
185185

@@ -284,14 +284,15 @@ Use the following JSON to associate an Azure Route Server:
284284

285285
You can use the portal to associate a Route Server with Azure Firewall to configure auto-learn SNAT routes (preview).
286286

287-
1. Select your resource group, and then select your firewall.
288-
2. Select **Overview**.
289-
3. Add a Route Server.
287+
Use the portal to complete the following tasks:
290288

291-
Review learned routes:
292-
293-
1. Select your resource group, and then select your firewall.
294-
2. Select **Learned SNAT IP Prefixes (preview)** in the **Settings** column.
289+
- Add a subnet named **RouteServerSubnet** to your existing firewall VNet. The size of the subnet should be at least /27.
290+
- Deploy a Route Server into the existing firewall VNet. For information about Azure Route Server, see [Quickstart: Create and configure Route Server using the Azure portal](../route-server/quickstart-configure-route-server-portal.md).
291+
- Modify your firewall policy to enable **Auto-learn IP prefixes (preview)** in the **Private IP ranges (SNAT)** section.
292+
:::image type="content" source="media/snat-private-range/auto-learn.png" alt-text="Screenshot showing firewall policy Private IP ranges (SNAT) settings." lightbox="media/snat-private-range/auto-learn.png":::
293+
- Add the route server on the firewall **Learned SNAT IP Prefixes (preview)** page.
294+
:::image type="content" source="media/snat-private-range/add-route-server.png" alt-text="Screenshot showing firewall add a route server." lightbox="media/snat-private-range/add-route-server.png":::
295+
- You can see the learned routes on the **Learned SNAT IP Prefixes (preview)** page.
295296

296297

297298
## Next steps

0 commit comments

Comments
 (0)