You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-stack/operator/azure-stack-troubleshooting.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -140,10 +140,9 @@ You may also take a snapshot of the original disk and create a new disk from it
140
140
-[Create a disk from a snapshot](/azure/virtual-machines/troubleshooting/troubleshoot-recovery-disks-portal-linux#create-a-disk-from-the-snapshot)
141
141
-[Changing and resetting the Root password](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/system_administrators_guide/ch-working_with_the_grub_2_boot_loader#sec-Changing_and_Resetting_the_Root_Password)
142
142
143
-
144
143
### License activation fails for Windows Server 2012 R2 during provisioning
145
144
146
-
In this case, Windows will fail to activate and you will see a watermark on the bottom-right corner of the screen. The WaSetup.xml logs located under C:\Windows\Panther contains the following event:
145
+
In this case, Windows fails to activate and you see a watermark on the bottom-right corner of the screen. The WaSetup.xml logs located under C:\Windows\Panther contains the following event:
@@ -208,11 +207,11 @@ If the Create-AADIdentityApp.ps1 script that's required for App Service fails, b
208
207
209
208
The Azure Stack Hub patch and update process is designed to allow operators to apply update packages in a consistent, streamlined way. While uncommon, issues can occur during patch and update process. The following steps are recommended should you encounter an issue during the patch and update process:
210
209
211
-
0.**Prerequisites**: Be sure that you have followed the [Update Activity Checklist](release-notes-checklist.md) and [enable proactive log collection](./diagnostic-log-collection.md#send-logs-proactively).
210
+
0.**Prerequisites**: Be sure that you follow the [Update Activity Checklist](release-notes-checklist.md) and [enable proactive log collection](./diagnostic-log-collection.md#send-logs-proactively).
212
211
213
212
1. Follow the remediation steps in the failure alert created when your update failed.
214
213
215
-
2. If you have been unable to resolve your issue, create an [Azure Stack Hub support ticket](./azure-stack-help-and-support-overview.md). Be sure you have [logs collected](./diagnostic-log-collection.md#send-logs-now) for the time span when the issue occurred. If an update fails, either with a critical alert or a warning, it's important that you review the failure and contact Microsoft Customer Support Services as directed in the alert so that your scale unit does not stay in a failed state for a long time. Leaving a scale unit in a failed update state for an extended period of time can cause additional issues that are more difficult to resolve later.
214
+
2. If you're unable to resolve your issue, create an [Azure Stack Hub support ticket](./azure-stack-help-and-support-overview.md). Make sure you [collect logs](./diagnostic-log-collection.md#send-logs-now) for the time span when the issue occurred. If an update fails, either with a critical alert or a warning, it's important that you review the failure and contact Microsoft Customer Support Services as directed in the alert so that your scale unit does not stay in a failed state for a long time. Leaving a scale unit in a failed update state for an extended period of time can cause additional issues that are more difficult to resolve later.
Copy file name to clipboardExpand all lines: azure-stack/user/azure-stack-network-howto-vnet-to-onprem.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.lastreviewed: 12/2/2020
16
16
17
17
# Set up VPN gateway for Azure Stack Hub using FortiGate NVA
18
18
19
-
This article describes how to create a VPN connection to your Azure Stack Hub. A VPN gateway is a type of virtual network gateway that sends encrypted traffic between your virtual network in Azure Stack Hub and a remote VPN gateway. The procedure below deploys one VNET with a FortiGate NVA, a network virtual appliance, within a resource group. It also provides steps to set up an IPSec VPN on the FortiGate NVA.
19
+
This article describes how to create a VPN connection to your Azure Stack Hub. A VPN gateway is a type of virtual network gateway that sends encrypted traffic between your virtual network in Azure Stack Hub and a remote VPN gateway. The following procedure deploys one VNET with a FortiGate NVA, a network virtual appliance, within a resource group. It also provides steps to set up an IPSec VPN on the FortiGate NVA.
20
20
21
21
## Prerequisites
22
22
@@ -27,7 +27,7 @@ This article describes how to create a VPN connection to your Azure Stack Hub. A
27
27
> [!NOTE]
28
28
> If you do not have the **Fortinet FortiGate-VM For Azure BYOL** and **FortiGate NGFW - Single VM Deployment (BYOL)** available in your Azure Stack Hub Marketplace, contact your cloud operator.
29
29
30
-
- To activate the FortiGate NVA, you will need at least one available FortiGate license file. Information on how to acquire these licenses, see the Fortinet Document Library article [Registering and downloading your license](https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/nutanix-administration-guide/324840/registering-and-downloading-your-license).
30
+
- To activate the FortiGate NVA, you need at least one available FortiGate license file. Information on how to acquire these licenses, see the Fortinet Document Library article [Registering and downloading your license](https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/nutanix-administration-guide/324840/registering-and-downloading-your-license).
31
31
32
32
This procedure uses the [Single FortiGate-VM deployment](https://docs.fortinet.com/document/fortigate-public-cloud/6.2.0/azure-administration-guide/632940/single-fortigate-vm-deployment). You can find steps on how to connect the FortiGate NVA to the Azure Stack Hub VNET to in your on-premises network.
33
33
@@ -75,7 +75,7 @@ The following table summarizes the parameters that are used in these deployments
75
75
1. Provide the Virtual network, Subnets, and VM Size details using the [Deployment parameters](#deployment-parameters) table.
76
76
77
77
> [!WARNING]
78
-
> If the on-premises network overlaps with the IP range `172.16.0.0/16`, you must select and set up a different network range and subnets. If you wish to use different names and ranges than the ones in the [Deployment parameters](#deployment-parameters) table, use parameters that will **not**conflict with the on-premises network. Take care when setting the VNET IP range and subnet ranges within the VNET. You do not want the range to overlap with the IP ranges that exist in your on-premises network.
78
+
> If the on-premises network overlaps with the IP range `172.16.0.0/16`, you must select and set up a different network range and subnets. If you wish to use different names and ranges than the ones in the [Deployment parameters](#deployment-parameters) table, use parameters that don't conflict with the on-premises network. Take care when setting the VNET IP range and subnet ranges within the VNET. You don't want the range to overlap with the IP ranges that exist in your on-premises network.
79
79
80
80
1. Select **OK**.
81
81
@@ -109,15 +109,15 @@ The following table summarizes the parameters that are used in these deployments
109
109
1. Enter the IP network range that defines the network range of the on-premises network to which the VPN connects.
110
110
1. Select **Virtual appliance** for **Next hop type** and `172.16.1.4`. If you use a different IP range, use your IP range.
111
111
112
-

112
+

113
113
114
114
1. Select **Save**.
115
115
116
116
## Activate the FortiGate NVA
117
117
118
118
Activate the FortiGate NVA and set up an IPSec VPN connection on each NVA.
119
119
120
-
To activate each FortiGate NVA will require a valid license file from Fortinet. The NVAs will **not**function until you have activated each NVA. For more information how to get a license file and steps to activate the NVA, see the Fortinet Document Library article [Registering and downloading your license](https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/nutanix-administration-guide/324840/registering-and-downloading-your-license).
120
+
To activate each FortiGate NVA, you need a valid license file from Fortinet. The NVAs don't function until you activate each NVA. For more information how to get a license file and steps to activate the NVA, see the Fortinet Document Library article [Registering and downloading your license](https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/nutanix-administration-guide/324840/registering-and-downloading-your-license).
121
121
122
122
Once you've activated the NVAs, create an IPSec VPN tunnel on the NVA.
123
123
@@ -165,7 +165,7 @@ Once you've activated the NVAs, create an IPSec VPN tunnel on the NVA.
165
165
166
166
Use your IP range if you are using a different IP range.
167
167
168
-
1. Enter the appropriate remote subnets that represent the on-premises network, to which you will connect through the on-premises VPN device.
168
+
1. Enter the appropriate remote subnets that represent the on-premises network, to which you connect through the on-premises VPN device.
169
169
170
170

171
171
@@ -180,7 +180,7 @@ Once you've activated the NVAs, create an IPSec VPN tunnel on the NVA.
180
180
181
181
## Configure the on-premises VPN
182
182
183
-
The on-premises VPN device must be configured to create the IPSec VPN tunnel. The following table provides the parameters you will need to set up the on-premises VPN device. For information on how to configure the on-premises VPN device, refer tp the documentation for your device.
183
+
The on-premises VPN device must be configured to create the IPSec VPN tunnel. The following table provides the parameters you need to set up the on-premises VPN device. For information about how to configure the on-premises VPN device, see the documentation for your device.
Copy file name to clipboardExpand all lines: azure-stack/user/azure-stack-network-howto-vnet-to-vnet-stacks.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,9 @@ ms.lastreviewed: 12/2/2020
16
16
17
17
# VNet to VNet connectivity between Azure Stack Hub instances with Fortinet FortiGate NVA
18
18
19
-
In this article, you'll connect a VNET in one Azure Stack Hub to a VNET in another Azure Stack Hub using Fortinet FortiGate NVA, a network virtual appliance.
19
+
This article describes how to connect a VNET in one Azure Stack Hub to a VNET in another Azure Stack Hub using Fortinet FortiGate NVA, a network virtual appliance.
20
20
21
-
This article addresses the current Azure Stack Hub limitation, which lets tenants set up only one VPN connection across two environments. Users will learn how to set up a custom gateway on a Linux virtual machine that will allow multiple VPN connections across different Azure Stack Hub. The procedure in this article deploys two VNETs with a FortiGate NVA in each VNET: one deployment per Azure Stack Hub environment. It also details the changes required to set up an IPSec VPN between the two VNETs. The steps in this article should be repeated for each VNET in each Azure Stack Hub.
21
+
This article addresses the current Azure Stack Hub limitation, which lets tenants set up only one VPN connection across two environments. The article describes how to set up a custom gateway on a Linux virtual machine that allows multiple VPN connections across different Azure Stack Hub. The procedure in this article deploys two VNETs with a FortiGate NVA in each VNET: one deployment per Azure Stack Hub environment. It also details the changes required to set up an IPSec VPN between the two VNETs. The steps in this article should be repeated for each VNET in each Azure Stack Hub.
22
22
23
23
## Prerequisites
24
24
@@ -90,10 +90,10 @@ Repeat these steps for both Azure Stack Hub environments.
90
90
1. Select **OK**.
91
91
1. Provide the virtual network, subnets, and VM size details from the [Deployment parameters](#deployment-parameters).
92
92
93
-
If you wish to use different names and ranges, take care not to use parameters that will conflict with the other VNET and FortiGate resources in the other Azure Stack Hub environment. This is especially true when setting the VNET IP range and subnet ranges within the VNET. Check that they don't overlap with the IP ranges for the other VNET you create.
93
+
If you want to use different names and ranges, take care not to use parameters that conflict with the other VNET and FortiGate resources in the other Azure Stack Hub environment. This limitation is especially true when setting the VNET IP range and subnet ranges within the VNET. Check that they don't overlap with the IP ranges for the other VNET you create.
94
94
95
95
1. Select **OK**.
96
-
1. Configure the public IP that will be used for the FortiGate NVA:
96
+
1. Configure the public IP to be used for the FortiGate NVA:
97
97
98
98

99
99
@@ -121,7 +121,7 @@ Perform these steps for both deployments, forti1-rg1 and forti2-rg1.
121
121
122
122
1. Select **Yes**.
123
123
1. Select **Add**.
124
-
1. Name the **Route**`to-forti1` or `to-forti2`. Use your IP range if you are using a different IP range.
124
+
1. Name the **Route**`to-forti1` or `to-forti2`. Use your IP range if you're using a different IP range.
125
125
1. Enter:
126
126
127
127
- forti1: `172.17.0.0/16`
@@ -175,7 +175,7 @@ Once the NVAs are activated, follow these steps to create an IPSec VPN between t
175
175

176
176
177
177
1. Select **Next**.
178
-
1. Enter the remote IP address of the on-premises VPN device to which you are going to connect.
178
+
1. Enter the remote IP address of the on-premises VPN device to which you're going to connect.
179
179
1. Select **port1** as the **Outgoing Interface**.
180
180
1. Select **Pre-shared Key** and enter (and record) a pre-shared key.
181
181
@@ -193,7 +193,7 @@ Once the NVAs are activated, follow these steps to create an IPSec VPN between t
193
193
194
194
If you use a different IP range, enter your IP range.
195
195
196
-
1. Enter the appropriate Remote Subnet(s) that represent the on-premises network, which you will connect to through the on-premises VPN device.
196
+
1. Enter the appropriate remote subnets that represent the on-premises network to which you connect through the on-premises VPN device:
197
197
198
198
- forti1: 172.16.0.0/16
199
199
- forti2: 172.17.0.0/16
@@ -231,7 +231,7 @@ You should now be able to route in between each VNET via the FortiGate NVAs. To
231
231
232
232
- The Azure Stack Hub VMs are placed on the **InsideSubnet** of each VNET.
233
233
- You don't apply any NSGs to the VM upon creation; that is, remove the NSG that gets added by default if creating the VM from the portal.
234
-
- Ensure that the VM firewall rules allow the communication you are going to use to test connectivity. For testing purposes, it's recommended that you disable the firewall completely within the OS, if at all possible.
234
+
- Ensure that the VM firewall rules allow the communication you're going to use to test connectivity. For testing purposes, it's recommended that you disable the firewall completely within the OS, if at all possible.
0 commit comments