Skip to content

Commit 2a04d2e

Browse files
committed
Changes
1 parent 42180af commit 2a04d2e

1 file changed

Lines changed: 16 additions & 12 deletions

File tree

articles/sap/workloads/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -23,18 +23,23 @@ This document outline different options to configure explicit outbound internet
2323

2424
## Overview
2525

26-
SAP systems deployment on Azure require outbound connectivity to reach internet or public endpoints even when the VMs themselves are not publicly reachable. Common examples include:
26+
VMs without public IP addresses placed in the backend pool of an internal Standard Azure Load Balancer have no outbound internet connectivity by default. Starting March 31, 2026, this behavior extends to all VMs in new virtual networks, including standalone VMs not associated with any load balancer.
27+
28+
Outbound connectivity to public endpoints is available when a VM has a public IP address assigned directly, or when it belongs to the backend pool of a load balancer with a public IP address.
29+
30+
SAP systems typically handle sensitive business data, making it rarely acceptable for SAP VMs to be directly accessible via public IP addresses. However, certain scenarios require outbound connectivity from VMs to public endpoints. Common examples include:
2731

2832
- Azure fence agent, requires access to `management.azure.com` and `login.microsoftonline.com` for STONITH operations in pacemaker clusters.
2933
- [Azure Backup](../../backup/backup-azure-sap-hana-database.md#establish-network-connectivity)
3034
- [Azure Site Recovery](../../site-recovery/azure-to-azure-about-networking.md#outbound-connectivity-for-urls)
3135
- Using package repositories for patching the operating system.
3236
- SAP application data flow may require outbound connectivity to external APIs or partner systems.
3337

34-
When VMs are placed in the backend pool of an internal Standard load balancer, there is no outbound connectivity by default. This was always true for Standard SKU load balancers. The March 31, 2026 change extends this principle to all new virtual network, even for standalone VMs without any load balancer.
38+
If your SAP deployment has no requirement for outbound connectivity to public endpoints and no need for inbound connectivity from the internet, no additional configuration is necessary beyond deploying an internal Standard SKU Azure Load Balancer for your high-availability scenario.
3539

3640
> [!NOTE]
3741
> When VMs without public IP addresses are added to the back-end pool of an internal Standard Azure Load Balancer, they lack outbound internet connectivity. Further configuration is needed to enable routing to public endpoints.
42+
>
3843
> VMs that have public IP addresses, or that are included in an Azure Load Balancer backend pool with a public IP, already have outbound access to public endpoints.
3944
4045
## Outbound connectivity options
@@ -70,7 +75,7 @@ There are dfiferent ways to configure explicit outbound connectivity for VMs, as
7075

7176
# [NAT Gateway](#tab/nat-gateway)
7277

73-
Azure NAT Gateway is a fully managed, highly resilient Network Address Translation (NAT) service that provides outbound connectivity for VMs in a subnet. NAT Gateway is configured at the subnet level once associated with a subnet, it becomes the preferred outbound connectivity method for all resources in that subnet. NAT Gateway takes precedence over other outbound configurations, including load balancer outbound rules and instance-level public IP addresses.
78+
Azure NAT Gateway is a fully managed, highly resilient Network Address Translation (NAT) service that provides outbound connectivity for VMs in a subnet. NAT Gateway is configured at the subnet level and once it is associated with a subnet, it becomes the preferred outbound connectivity method for all resources in that subnet. NAT Gateway takes precedence over other outbound configurations, including load balancer outbound rules and instance-level public IP addresses.
7479

7580
To achieve outbound connectivity to public end points, without allowing inbound connectivity to the VM from a public end point, associate an Azure NAT Gateway with the subnet where the SAP VMs and Standard Load Balancer are deployed. Use [Network Security Groups](../../virtual-network/network-security-groups-overview.md) to control the public end points that are accessible for outbound calls from the VMs.
7681

@@ -84,7 +89,7 @@ To achieve outbound connectivity to public end points, without allowing inbound
8489

8590
For step-by-step instructions on creating and configuring an Azure NAT Gateway, see:
8691

87-
- [Quickstart: Create a NAT gateway using the Azure portal](../../nat-gateway/quickstart-create-nat-gateway-portal-v2.md) - Instructions on how to create a NAT gateway resource and associate it with a subnet.
92+
- [Quickstart: Create a NAT gateway using the Azure portal](../../nat-gateway/quickstart-create-nat-gateway-v2.md) - Instructions on how to create a NAT gateway resource and associate it with a subnet.
8893
- [Manage a NAT gateway](../../nat-gateway/manage-nat-gateway-v2.md) - How to add or remove public IP addresses and subnets from an existing NAT Gateway.
8994

9095
# [Azure Standard Load Balancer](#tab/azure-standard-lb)
@@ -118,26 +123,25 @@ Create the Load Balancer.
118123
1. Select **Zone Redundant** as Availability zone.
119124
1. Select **Review and Create**, then select **Create**.
120125
1. Create the Backend pool **MyBackendPoolOfPublicILB** and add the VMs.
121-
1. Select the Virtual network.
122-
1. Select the VMs and their IP addresses and add them to the backend pool.
126+
1. Select the Virtual network.
127+
1. Select the VMs and their IP addresses and add them to the backend pool.
123128
1. Create [outbound rules](../../load-balancer/egress-only.md#create-a-public-load-balancer-outbound-rule).
124129

125130
```azurecli
126131
az network lb outbound-rule create --address-pool MyBackendPoolOfPublicILB --frontend-ip-configs MyPublicILBFrondEndIP --idle-timeout 30 --lb-name MyPublicILB --name MyOutBoundRules --outbound-ports 10000 --enable-tcp-reset true --protocol All --resource-group MyResourceGroup
127132
```
128133

129134
1. Create Network Security group rules to restrict access to specific Public End Points. If there's existing Network Security Group, you can adjust it. The following steps show how to enable access to the Azure management API:
130-
131135
1. Navigate to the NSG.
132136
1. Select **Outbound Security Rules**.
133137
1. Add a rule to **Deny** all outbound Access to **Internet**.
134138
1. Add a rule to **Allow** access to **AzureCloud**, with priority lower than the priority of the rule to deny all internet access.
135139

136-
The outbound security rules would look like:
140+
The outbound security rules would look like:
137141

138-
![A screenshot of outbound network connections with a second load balancer using a public IP address.](./media/high-availability-guide-standard-load-balancer/high-availability-guide-standard-load-balancer-network-security-groups.png)
142+
![A screenshot of outbound network connections with a second load balancer using a public IP address.](./media/high-availability-guide-standard-load-balancer/high-availability-guide-standard-load-balancer-network-security-groups.png)
139143

140-
For more information on Azure NSG, see [Security Groups](../../virtual-network/network-security-groups-overview.md).
144+
For more information on Azure NSG, see [Security Groups](../../virtual-network/network-security-groups-overview.md).
141145

142146
# [Azure Firewall](#tab/azure-firewall)
143147

@@ -194,9 +198,9 @@ Create an Azure Firewall route.
194198
1. For ***Name**, enter **MyRouteTable**, select **Subscription**, **Resource group**, and **Location** (matching the location of your virtual network and Firewall).
195199
1. Save your information.
196200

197-
The firewall rule would look like:
201+
The firewall rule would look like:
198202

199-
![A screenshot of an Azure Firewall outbound connection rule for a public end point.](./media/high-availability-guide-standard-load-balancer/high-availability-guide-standard-load-balancer-firewall-rule.png)
203+
![A screenshot of an Azure Firewall outbound connection rule for a public end point.](./media/high-availability-guide-standard-load-balancer/high-availability-guide-standard-load-balancer-firewall-rule.png)
200204

201205
Create User Defined Route from the subnet of your VMs to the private IP of **MyAzureFirewall**.
202206

0 commit comments

Comments
 (0)