Skip to content

Commit 262b16f

Browse files
Merge pull request #310608 from yash177-maker1/docs-editor/native-internet-connectivity-d-1768606642
Update native-internet-connectivity-design-considerations.md
2 parents 17b082d + b093bf4 commit 262b16f

1 file changed

Lines changed: 3 additions & 1 deletion

File tree

articles/azure-vmware/native-internet-connectivity-design-considerations.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,11 @@ Internet connectivity using Azure Firewall is similar to the way Azure virtual n
2929
## Steps:
3030

3131
1. Have or create Azure Firewall or a third-party Network Virtual Appliance in the virtual network local to the private cloud or in the peered virtual network.
32-
2. Define an Azure route table with a 0.0.0.0/0 route pointing to the next-hop type Virtual Appliance with the next-hop IP address of the Azure Firewall private IP or IP of the Network Virtual Appliance.
32+
1. Define an Azure route table with a 0.0.0.0/0 route pointing to the next-hop type Virtual Appliance with the next-hop IP address of the Azure Firewall private IP or IP of the Network Virtual Appliance.
3333
1. Associate the route table to the Azure VMware Solution specific virtual network subnets named “avs-nsx-gw” and “avs-nsx-gw-1”, which are part of the virtual network associated with private cloud.
3434

35+
1. Associate the route table to the Azure VMware Solution specific virtual network subnet named "avs-services", required for management appliances, including vCenter, NSX and HCX Manager to communicate outbound.
36+
3537
>[!Note]
3638
>The Azure route tables (UDR), associated with private cloud uplink subnets, and private cloud VNet need to be in the same Azure resource group.
3739

0 commit comments

Comments
 (0)