You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/high-availability-guide-standard-load-balancer-outbound-connections.md
+16-12Lines changed: 16 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,18 +23,23 @@ This document outline different options to configure explicit outbound internet
23
23
24
24
## Overview
25
25
26
-
SAP systems deployment on Azure require outbound connectivity to reach internet or public endpoints even when the VMs themselves are not publicly reachable. Common examples include:
26
+
VMs without public IP addresses placed in the backend pool of an internal Standard Azure Load Balancer have no outbound internet connectivity by default. Starting March 31, 2026, this behavior extends to all VMs in new virtual networks, including standalone VMs not associated with any load balancer.
27
+
28
+
Outbound connectivity to public endpoints is available when a VM has a public IP address assigned directly, or when it belongs to the backend pool of a load balancer with a public IP address.
29
+
30
+
SAP systems typically handle sensitive business data, making it rarely acceptable for SAP VMs to be directly accessible via public IP addresses. However, certain scenarios require outbound connectivity from VMs to public endpoints. Common examples include:
27
31
28
32
- Azure fence agent, requires access to `management.azure.com` and `login.microsoftonline.com` for STONITH operations in pacemaker clusters.
-[Azure Site Recovery](../../site-recovery/azure-to-azure-about-networking.md#outbound-connectivity-for-urls)
31
35
- Using package repositories for patching the operating system.
32
36
- SAP application data flow may require outbound connectivity to external APIs or partner systems.
33
37
34
-
When VMs are placed in the backend pool of an internal Standard load balancer, there is no outbound connectivity by default. This was always true for Standard SKU load balancers. The March 31, 2026 change extends this principle to all new virtual network, even for standalone VMs without any load balancer.
38
+
If your SAP deployment has no requirement for outbound connectivity to public endpoints and no need for inbound connectivity from the internet, no additional configuration is necessary beyond deploying an internal Standard SKU Azure Load Balancer for your high-availability scenario.
35
39
36
40
> [!NOTE]
37
41
> When VMs without public IP addresses are added to the back-end pool of an internal Standard Azure Load Balancer, they lack outbound internet connectivity. Further configuration is needed to enable routing to public endpoints.
42
+
>
38
43
> VMs that have public IP addresses, or that are included in an Azure Load Balancer backend pool with a public IP, already have outbound access to public endpoints.
39
44
40
45
## Outbound connectivity options
@@ -70,7 +75,7 @@ There are dfiferent ways to configure explicit outbound connectivity for VMs, as
70
75
71
76
# [NAT Gateway](#tab/nat-gateway)
72
77
73
-
Azure NAT Gateway is a fully managed, highly resilient Network Address Translation (NAT) service that provides outbound connectivity for VMs in a subnet. NAT Gateway is configured at the subnet level — once associated with a subnet, it becomes the preferred outbound connectivity method for all resources in that subnet. NAT Gateway takes precedence over other outbound configurations, including load balancer outbound rules and instance-level public IP addresses.
78
+
Azure NAT Gateway is a fully managed, highly resilient Network Address Translation (NAT) service that provides outbound connectivity for VMs in a subnet. NAT Gateway is configured at the subnet level and once it is associated with a subnet, it becomes the preferred outbound connectivity method for all resources in that subnet. NAT Gateway takes precedence over other outbound configurations, including load balancer outbound rules and instance-level public IP addresses.
74
79
75
80
To achieve outbound connectivity to public end points, without allowing inbound connectivity to the VM from a public end point, associate an Azure NAT Gateway with the subnet where the SAP VMs and Standard Load Balancer are deployed. Use [Network Security Groups](../../virtual-network/network-security-groups-overview.md) to control the public end points that are accessible for outbound calls from the VMs.
76
81
@@ -84,7 +89,7 @@ To achieve outbound connectivity to public end points, without allowing inbound
84
89
85
90
For step-by-step instructions on creating and configuring an Azure NAT Gateway, see:
86
91
87
-
-[Quickstart: Create a NAT gateway using the Azure portal](../../nat-gateway/quickstart-create-nat-gateway-portal-v2.md) - Instructions on how to create a NAT gateway resource and associate it with a subnet.
92
+
-[Quickstart: Create a NAT gateway using the Azure portal](../../nat-gateway/quickstart-create-nat-gateway-v2.md) - Instructions on how to create a NAT gateway resource and associate it with a subnet.
88
93
-[Manage a NAT gateway](../../nat-gateway/manage-nat-gateway-v2.md) - How to add or remove public IP addresses and subnets from an existing NAT Gateway.
89
94
90
95
# [Azure Standard Load Balancer](#tab/azure-standard-lb)
@@ -118,26 +123,25 @@ Create the Load Balancer.
118
123
1. Select **Zone Redundant** as Availability zone.
119
124
1. Select **Review and Create**, then select **Create**.
120
125
1. Create the Backend pool **MyBackendPoolOfPublicILB** and add the VMs.
121
-
1. Select the Virtual network.
122
-
1. Select the VMs and their IP addresses and add them to the backend pool.
126
+
1. Select the Virtual network.
127
+
1. Select the VMs and their IP addresses and add them to the backend pool.
1. Create Network Security group rules to restrict access to specific Public End Points. If there's existing Network Security Group, you can adjust it. The following steps show how to enable access to the Azure management API:
130
-
131
135
1. Navigate to the NSG.
132
136
1. Select **Outbound Security Rules**.
133
137
1. Add a rule to **Deny** all outbound Access to **Internet**.
134
138
1. Add a rule to **Allow** access to **AzureCloud**, with priority lower than the priority of the rule to deny all internet access.
135
139
136
-
The outbound security rules would look like:
140
+
The outbound security rules would look like:
137
141
138
-

142
+

139
143
140
-
For more information on Azure NSG, see [Security Groups](../../virtual-network/network-security-groups-overview.md).
144
+
For more information on Azure NSG, see [Security Groups](../../virtual-network/network-security-groups-overview.md).
141
145
142
146
# [Azure Firewall](#tab/azure-firewall)
143
147
@@ -194,9 +198,9 @@ Create an Azure Firewall route.
194
198
1. For ***Name**, enter **MyRouteTable**, select **Subscription**, **Resource group**, and **Location** (matching the location of your virtual network and Firewall).
195
199
1. Save your information.
196
200
197
-
The firewall rule would look like:
201
+
The firewall rule would look like:
198
202
199
-

203
+

200
204
201
205
Create User Defined Route from the subnet of your VMs to the private IP of **MyAzureFirewall**.
0 commit comments