Skip to content

Commit fbbb580

Browse files
author
rdeltcheva
committed
Change NAT GW to outbound ILB rules
1 parent 65233a3 commit fbbb580

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/sap/workloads/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: sap-vm-workloads
1313
ms.topic: article
1414
ms.tgt_pltfrm: vm-windows
1515
ms.workload: infrastructure-services
16-
ms.date: 12/01/2020
16+
ms.date: 09/03/2023
1717
ms.author: radeltch
1818

1919
---
@@ -95,7 +95,10 @@ The configuration would look like:
9595
2. Create Backend pool **MyBackendPoolOfPublicILB** and add the VMs.
9696
1. Select the Virtual network
9797
1. Select the VMs and their IP addresses and add them to the backend pool
98-
3. Create a NAT gateway for outbound internet access. For more information see [Quickstart: Create a NAT gateway - Azure CLI](../../virtual-network/nat-gateway/quickstart-create-nat-gateway-cli.md).
98+
3. [Create outbound rules](../../load-balancer/quickstart-load-balancer-standard-public-cli.md?tabs=option-1-create-load-balancer-standard%3ftabs%3doption-1-create-load-balancer-standard#create-outbound-rule-configuration).
99+
100+
```azurecli
101+
az network lb outbound-rule create --address-pool MyBackendPoolOfPublicILB --frontend-ip-configs MyPublicILBFrondEndIP --idle-timeout 30 --lb-name MyPublicILB --name MyOutBoundRules --outbound-ports 10000 --enable-tcp-reset true --protocol All --resource-group MyResourceGroup
99102
4. Create Network Security group rules to restrict access to specific Public End Points. If there is existing Network Security Group, you can adjust it. The example below shows how to enable access to the Azure management API:
100103
1. Navigate to the Network Security Group
101104
1. Click Outbound Security Rules

0 commit comments

Comments
 (0)