Skip to content

Commit 048e22c

Browse files
committed
Acrolinx
1 parent 082aebd commit 048e22c

File tree

3 files changed

+18
-19
lines changed

3 files changed

+18
-19
lines changed

azure-stack/operator/azure-stack-troubleshooting.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -140,10 +140,9 @@ You may also take a snapshot of the original disk and create a new disk from it
140140
- [Create a disk from a snapshot](/azure/virtual-machines/troubleshooting/troubleshoot-recovery-disks-portal-linux#create-a-disk-from-the-snapshot)
141141
- [Changing and resetting the Root password](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/system_administrators_guide/ch-working_with_the_grub_2_boot_loader#sec-Changing_and_Resetting_the_Root_Password)
142142

143-
144143
### License activation fails for Windows Server 2012 R2 during provisioning
145144

146-
In this case, Windows will fail to activate and you will see a watermark on the bottom-right corner of the screen. The WaSetup.xml logs located under C:\Windows\Panther contains the following event:
145+
In this case, Windows fails to activate and you see a watermark on the bottom-right corner of the screen. The WaSetup.xml logs located under C:\Windows\Panther contains the following event:
147146

148147
```xml
149148
<Event time="2019-05-16T21:32:58.660Z" category="ERROR" source="Unattend">
@@ -208,11 +207,11 @@ If the Create-AADIdentityApp.ps1 script that's required for App Service fails, b
208207

209208
The Azure Stack Hub patch and update process is designed to allow operators to apply update packages in a consistent, streamlined way. While uncommon, issues can occur during patch and update process. The following steps are recommended should you encounter an issue during the patch and update process:
210209

211-
0. **Prerequisites**: Be sure that you have followed the [Update Activity Checklist](release-notes-checklist.md) and [enable proactive log collection](./diagnostic-log-collection.md#send-logs-proactively).
210+
0. **Prerequisites**: Be sure that you follow the [Update Activity Checklist](release-notes-checklist.md) and [enable proactive log collection](./diagnostic-log-collection.md#send-logs-proactively).
212211

213212
1. Follow the remediation steps in the failure alert created when your update failed.
214213

215-
2. If you have been unable to resolve your issue, create an [Azure Stack Hub support ticket](./azure-stack-help-and-support-overview.md). Be sure you have [logs collected](./diagnostic-log-collection.md#send-logs-now) for the time span when the issue occurred. If an update fails, either with a critical alert or a warning, it's important that you review the failure and contact Microsoft Customer Support Services as directed in the alert so that your scale unit does not stay in a failed state for a long time. Leaving a scale unit in a failed update state for an extended period of time can cause additional issues that are more difficult to resolve later.
214+
2. If you're unable to resolve your issue, create an [Azure Stack Hub support ticket](./azure-stack-help-and-support-overview.md). Make sure you [collect logs](./diagnostic-log-collection.md#send-logs-now) for the time span when the issue occurred. If an update fails, either with a critical alert or a warning, it's important that you review the failure and contact Microsoft Customer Support Services as directed in the alert so that your scale unit does not stay in a failed state for a long time. Leaving a scale unit in a failed update state for an extended period of time can cause additional issues that are more difficult to resolve later.
216215

217216
## Common Azure Stack Hub patch and update issues
218217

azure-stack/user/azure-stack-network-howto-vnet-to-onprem.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.lastreviewed: 12/2/2020
1616

1717
# Set up VPN gateway for Azure Stack Hub using FortiGate NVA
1818

19-
This article describes how to create a VPN connection to your Azure Stack Hub. A VPN gateway is a type of virtual network gateway that sends encrypted traffic between your virtual network in Azure Stack Hub and a remote VPN gateway. The procedure below deploys one VNET with a FortiGate NVA, a network virtual appliance, within a resource group. It also provides steps to set up an IPSec VPN on the FortiGate NVA.
19+
This article describes how to create a VPN connection to your Azure Stack Hub. A VPN gateway is a type of virtual network gateway that sends encrypted traffic between your virtual network in Azure Stack Hub and a remote VPN gateway. The following procedure deploys one VNET with a FortiGate NVA, a network virtual appliance, within a resource group. It also provides steps to set up an IPSec VPN on the FortiGate NVA.
2020

2121
## Prerequisites
2222

@@ -27,7 +27,7 @@ This article describes how to create a VPN connection to your Azure Stack Hub. A
2727
> [!NOTE]
2828
> If you do not have the **Fortinet FortiGate-VM For Azure BYOL** and **FortiGate NGFW - Single VM Deployment (BYOL)** available in your Azure Stack Hub Marketplace, contact your cloud operator.
2929
30-
- To activate the FortiGate NVA, you will need at least one available FortiGate license file. Information on how to acquire these licenses, see the Fortinet Document Library article [Registering and downloading your license](https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/nutanix-administration-guide/324840/registering-and-downloading-your-license).
30+
- To activate the FortiGate NVA, you need at least one available FortiGate license file. Information on how to acquire these licenses, see the Fortinet Document Library article [Registering and downloading your license](https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/nutanix-administration-guide/324840/registering-and-downloading-your-license).
3131

3232
This procedure uses the [Single FortiGate-VM deployment](https://docs.fortinet.com/document/fortigate-public-cloud/6.2.0/azure-administration-guide/632940/single-fortigate-vm-deployment). You can find steps on how to connect the FortiGate NVA to the Azure Stack Hub VNET to in your on-premises network.
3333

@@ -75,7 +75,7 @@ The following table summarizes the parameters that are used in these deployments
7575
1. Provide the Virtual network, Subnets, and VM Size details using the [Deployment parameters](#deployment-parameters) table.
7676

7777
> [!WARNING]
78-
> If the on-premises network overlaps with the IP range `172.16.0.0/16`, you must select and set up a different network range and subnets. If you wish to use different names and ranges than the ones in the [Deployment parameters](#deployment-parameters) table, use parameters that will **not** conflict with the on-premises network. Take care when setting the VNET IP range and subnet ranges within the VNET. You do not want the range to overlap with the IP ranges that exist in your on-premises network.
78+
> If the on-premises network overlaps with the IP range `172.16.0.0/16`, you must select and set up a different network range and subnets. If you wish to use different names and ranges than the ones in the [Deployment parameters](#deployment-parameters) table, use parameters that don't conflict with the on-premises network. Take care when setting the VNET IP range and subnet ranges within the VNET. You don't want the range to overlap with the IP ranges that exist in your on-premises network.
7979
8080
1. Select **OK**.
8181

@@ -109,15 +109,15 @@ The following table summarizes the parameters that are used in these deployments
109109
1. Enter the IP network range that defines the network range of the on-premises network to which the VPN connects.
110110
1. Select **Virtual appliance** for **Next hop type** and `172.16.1.4`. If you use a different IP range, use your IP range.
111111

112-
![The Add route dialog box shows the four values that have been entered into the text boxes.](./media/azure-stack-network-howto-vnet-to-onprem/image12a.png)
112+
![The Add route dialog box shows the four values that were entered into the text boxes.](./media/azure-stack-network-howto-vnet-to-onprem/image12a.png)
113113

114114
1. Select **Save**.
115115

116116
## Activate the FortiGate NVA
117117

118118
Activate the FortiGate NVA and set up an IPSec VPN connection on each NVA.
119119

120-
To activate each FortiGate NVA will require a valid license file from Fortinet. The NVAs will **not** function until you have activated each NVA. For more information how to get a license file and steps to activate the NVA, see the Fortinet Document Library article [Registering and downloading your license](https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/nutanix-administration-guide/324840/registering-and-downloading-your-license).
120+
To activate each FortiGate NVA, you need a valid license file from Fortinet. The NVAs don't function until you activate each NVA. For more information how to get a license file and steps to activate the NVA, see the Fortinet Document Library article [Registering and downloading your license](https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/nutanix-administration-guide/324840/registering-and-downloading-your-license).
121121

122122
Once you've activated the NVAs, create an IPSec VPN tunnel on the NVA.
123123

@@ -165,7 +165,7 @@ Once you've activated the NVAs, create an IPSec VPN tunnel on the NVA.
165165

166166
Use your IP range if you are using a different IP range.
167167

168-
1. Enter the appropriate remote subnets that represent the on-premises network, to which you will connect through the on-premises VPN device.
168+
1. Enter the appropriate remote subnets that represent the on-premises network, to which you connect through the on-premises VPN device.
169169

170170
![The screenshot of the VPN Creation Wizard shows it to be on the third step, Policy & Routing. It shows the selected and entered values.](./media/azure-stack-network-howto-vnet-to-onprem/image18a.png)
171171

@@ -180,7 +180,7 @@ Once you've activated the NVAs, create an IPSec VPN tunnel on the NVA.
180180

181181
## Configure the on-premises VPN
182182

183-
The on-premises VPN device must be configured to create the IPSec VPN tunnel. The following table provides the parameters you will need to set up the on-premises VPN device. For information on how to configure the on-premises VPN device, refer tp the documentation for your device.
183+
The on-premises VPN device must be configured to create the IPSec VPN tunnel. The following table provides the parameters you need to set up the on-premises VPN device. For information about how to configure the on-premises VPN device, see the documentation for your device.
184184

185185
| Parameter | Value |
186186
| --- | --- |

azure-stack/user/azure-stack-network-howto-vnet-to-vnet-stacks.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ ms.lastreviewed: 12/2/2020
1616

1717
# VNet to VNet connectivity between Azure Stack Hub instances with Fortinet FortiGate NVA
1818

19-
In this article, you'll connect a VNET in one Azure Stack Hub to a VNET in another Azure Stack Hub using Fortinet FortiGate NVA, a network virtual appliance.
19+
This article describes how to connect a VNET in one Azure Stack Hub to a VNET in another Azure Stack Hub using Fortinet FortiGate NVA, a network virtual appliance.
2020

21-
This article addresses the current Azure Stack Hub limitation, which lets tenants set up only one VPN connection across two environments. Users will learn how to set up a custom gateway on a Linux virtual machine that will allow multiple VPN connections across different Azure Stack Hub. The procedure in this article deploys two VNETs with a FortiGate NVA in each VNET: one deployment per Azure Stack Hub environment. It also details the changes required to set up an IPSec VPN between the two VNETs. The steps in this article should be repeated for each VNET in each Azure Stack Hub.
21+
This article addresses the current Azure Stack Hub limitation, which lets tenants set up only one VPN connection across two environments. The article describes how to set up a custom gateway on a Linux virtual machine that allows multiple VPN connections across different Azure Stack Hub. The procedure in this article deploys two VNETs with a FortiGate NVA in each VNET: one deployment per Azure Stack Hub environment. It also details the changes required to set up an IPSec VPN between the two VNETs. The steps in this article should be repeated for each VNET in each Azure Stack Hub.
2222

2323
## Prerequisites
2424

@@ -90,10 +90,10 @@ Repeat these steps for both Azure Stack Hub environments.
9090
1. Select **OK**.
9191
1. Provide the virtual network, subnets, and VM size details from the [Deployment parameters](#deployment-parameters).
9292

93-
If you wish to use different names and ranges, take care not to use parameters that will conflict with the other VNET and FortiGate resources in the other Azure Stack Hub environment. This is especially true when setting the VNET IP range and subnet ranges within the VNET. Check that they don't overlap with the IP ranges for the other VNET you create.
93+
If you want to use different names and ranges, take care not to use parameters that conflict with the other VNET and FortiGate resources in the other Azure Stack Hub environment. This limitation is especially true when setting the VNET IP range and subnet ranges within the VNET. Check that they don't overlap with the IP ranges for the other VNET you create.
9494

9595
1. Select **OK**.
96-
1. Configure the public IP that will be used for the FortiGate NVA:
96+
1. Configure the public IP to be used for the FortiGate NVA:
9797

9898
![The "Public IP address name" text box of the IP Assignment dialog box shows a value of "forti1-publicip1" (from the Deployment Table).](./media/azure-stack-network-howto-vnet-to-vnet-stacks/image8.png)
9999

@@ -121,7 +121,7 @@ Perform these steps for both deployments, forti1-rg1 and forti2-rg1.
121121

122122
1. Select **Yes**.
123123
1. Select **Add**.
124-
1. Name the **Route** `to-forti1` or `to-forti2`. Use your IP range if you are using a different IP range.
124+
1. Name the **Route** `to-forti1` or `to-forti2`. Use your IP range if you're using a different IP range.
125125
1. Enter:
126126

127127
- forti1: `172.17.0.0/16`
@@ -175,7 +175,7 @@ Once the NVAs are activated, follow these steps to create an IPSec VPN between t
175175
![The screenshot of the VPN Creation Wizard shows it to be on the first step, VPN Setup. The following values are selected: "Site to Site" for Template Type, "FortiGate" for Remote Device Type, and "This site is behind NAT" for NAT Configuration.](./media/azure-stack-network-howto-vnet-to-vnet-stacks/image16.png)
176176

177177
1. Select **Next**.
178-
1. Enter the remote IP address of the on-premises VPN device to which you are going to connect.
178+
1. Enter the remote IP address of the on-premises VPN device to which you're going to connect.
179179
1. Select **port1** as the **Outgoing Interface**.
180180
1. Select **Pre-shared Key** and enter (and record) a pre-shared key.
181181

@@ -193,7 +193,7 @@ Once the NVAs are activated, follow these steps to create an IPSec VPN between t
193193

194194
If you use a different IP range, enter your IP range.
195195

196-
1. Enter the appropriate Remote Subnet(s) that represent the on-premises network, which you will connect to through the on-premises VPN device.
196+
1. Enter the appropriate remote subnets that represent the on-premises network to which you connect through the on-premises VPN device:
197197

198198
- forti1: 172.16.0.0/16
199199
- forti2: 172.17.0.0/16
@@ -231,7 +231,7 @@ You should now be able to route in between each VNET via the FortiGate NVAs. To
231231

232232
- The Azure Stack Hub VMs are placed on the **InsideSubnet** of each VNET.
233233
- You don't apply any NSGs to the VM upon creation; that is, remove the NSG that gets added by default if creating the VM from the portal.
234-
- Ensure that the VM firewall rules allow the communication you are going to use to test connectivity. For testing purposes, it's recommended that you disable the firewall completely within the OS, if at all possible.
234+
- Ensure that the VM firewall rules allow the communication you're going to use to test connectivity. For testing purposes, it's recommended that you disable the firewall completely within the OS, if at all possible.
235235

236236
## Next steps
237237

0 commit comments

Comments
 (0)