You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/nat-gateway/faq.yml
+4-2Lines changed: 4 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ sections:
63
63
questions:
64
64
- question: What is StandardV2 NAT Gateway?
65
65
answer: |
66
-
StandardV2 NAT Gateway is a new SKU offering of the Azure NAT Gateway service that is currently in **Public Preview**. StandardV2 NAT Gateway offers zone-redundancy support, enhanced data processing limits, IPv6 support, Flow logs, and increased scalability compared to the original Standard NAT Gateway. For more information, see [NAT Gateway SKUs](nat-sku.md).
66
+
StandardV2 NAT Gateway is a new SKU offering of the Azure NAT Gateway service. StandardV2 NAT Gateway offers zone-redundancy support, enhanced data processing limits, IPv6 support, Flow logs, and increased scalability compared to the original Standard NAT Gateway. For more information, see [NAT Gateway SKUs](nat-sku.md).
67
67
68
68
- question: Can I upgrade my existing Standard NAT Gateway to StandardV2 NAT Gateway?
69
69
answer: |
@@ -91,7 +91,7 @@ sections:
91
91
92
92
- question: Is StandardV2 NAT Gateway available in all public regions?
93
93
answer: |
94
-
No, StandardV2 NAT Gateway is available in most public regions. StandardV2 NAT Gateway isn't available in: Canada East, Central India, Chile Central, Indonesia Central, Israel Northwest, Malaysia West, Qatar Central, UAE Central.
94
+
No, StandardV2 NAT Gateway is available in most public regions. To learn more about which regions are not supported yet for StandardV2 NAT Gateway, see [known limitations](./nat-sku.md#known-limitations).
95
95
96
96
- name: NAT gateway metrics
97
97
questions:
@@ -120,6 +120,8 @@ sections:
120
120
- question: Are connections disrupted after attaching a NAT gateway to a subnet where a different service is currently used for outbound connectivity?
121
121
answer: |
122
122
No, there's no disruption in connections. Existing connections with the previous outbound service (Load Balancer, Azure Firewall, instance-level public IP addresses) continues to work until those connections close. After a NAT gateway is added to the subnet of the virtual network, all new connections use a NAT gateway for making outbound connections.
123
+
124
+
However, there is a known issue with StandardV2 NAT Gateway and existing connections using a Load balancer, Firewall, or a virtual machine instance level public IP. Existing connections with other outbound connectivity methods will be disrupted after adding StandardV2 NAT Gateway to a subnet. All net new connections will use the StandardV2 NAT Gateway. To learn more see [known issues](./nat-sku.md#known-issues).
123
125
124
126
- question: Can a NAT gateway public IP connect directly to a private IP address over the internet?
Copy file name to clipboardExpand all lines: articles/nat-gateway/nat-overview.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,14 +55,18 @@ To learn more on how to deploy StandardV2 NAT Gateway, see [Create a StandardV2
55
55
* Requires StandardV2 SKU public IP addresses or prefixes. Standard SKU public IPs aren't supported with StandardV2 NAT Gateway.
56
56
* Standard SKU NAT Gateway can't be upgraded to StandardV2 NAT Gateway. You must first create StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway on your subnet.
57
57
* The following regions don't support StandardV2 NAT Gateway:
58
+
* Brazil Southeast
58
59
* Canada East
59
60
* Central India
60
61
* Chile Central
61
62
* Indonesia Central
62
63
* Israel Northwest
63
64
* Malaysia West
64
65
* Qatar Central
66
+
* Sweden South
65
67
* UAE Central
68
+
* West Central US
69
+
* West India
66
70
* Terraform doesn't yet support StandardV2 NAT Gateway and StandardV2 Public IP deployments.
67
71
* StandardV2 NAT Gateway doesn't support and can't be attached to delegated subnets for the following services:
68
72
* Azure SQL Managed Instance
@@ -80,7 +84,9 @@ To learn more on how to deploy StandardV2 NAT Gateway, see [Create a StandardV2
80
84
### Known issues of StandardV2 NAT Gateway
81
85
* IPv6 outbound traffic using Load balancer outbound rules is disrupted when StandardV2 NAT Gateway is associated to a subnet. If you require both IPv4 and IPv6 outbound connectivity, use either Load balancer outbound rules for both IPv4 and IPv6 traffic or use Standard NAT Gateway for IPv4 traffic and Load balancer outbound rules for IPv6 traffic.
82
86
83
-
* Attaching a StandardV2 NAT Gateway to an empty subnet created before April 2025 without any virtual machines may cause the virtual network to go into a failed state. To return the virtual network to a successful state, remove StandardV2 NAT Gateway, create and add a virtual machine to the subnet and then reattach the StandardV2 NAT Gateway.
87
+
* Attaching a StandardV2 NAT gateway to an empty subnet created before April 2025 without any virtual machines may cause the virtual network to go into a failed state. To return the virtual network to a successful state, remove StandardV2 NAT Gateway, create and add a virtual machine to the subnet and then reattach the StandardV2 NAT Gateway.
88
+
89
+
* Outbound connections using Load balancer, Azure Firewall, or virtual machine instance level public IPs may be interrupted when adding StandardV2 NAT gateway to a subnet. All net new outbound connections will use the StandardV2 NAT gateway.
84
90
85
91
For more information about known issues and limitations of StandardV2 NAT Gateway, see [StandardV2 NAT Gateway known issues and limitations](./nat-sku.md#known-limitations).
* StandardV2 NAT Gateway can’t be deployed as a managed NAT Gateway for Azure Kubernetes Service (AKS) workloads. It's only supported when configured as a user-assigned NAT Gateway. For more information, see [Create NAT Gateway for your AKS cluster](/azure/aks/nat-gateway).
* StandardV2 NAT Gateway disrupts outbound connections made with Load balancer outbound rules for IPv6 traffic only. Standard SKU NAT gateway can be used to provide outbound for IPv4 traffic while Load balancer outbound rules is used for IPv6 outbound traffic. If you see disruption to outbound connectivity for IPv6 outbound traffic with Load balancer outbound rules, remove the StandardV2 NAT Gateway from the subnet or virtual network. Use Load balancer outbound rules to provide outbound connectivity for both IPv4 and IPv6 traffic. Or use Standard SKU NAT Gateway to provide outbound connectivity for IPv4 traffic and Load balancer outbound rules for IPv6 traffic.
111
119
112
-
* Attaching a StandardV2 NAT Gateway to an empty subnet created before April 2025 without any virtual machines may cause the virtual network to go into a failed state. To return the virtual network to a successful state, remove StandardV2 NAT Gateway, create and add a virtual machine to the subnet and then reattach the StandardV2 NAT Gateway.
120
+
* Attaching a StandardV2 NAT gateway to an empty subnet created before April 2025 without any virtual machines may cause the virtual network to go into a failed state. To return the virtual network to a successful state, remove StandardV2 NAT Gateway, create and add a virtual machine to the subnet and then reattach the StandardV2 NAT Gateway.
121
+
122
+
* Outbound connections using Load balancer, Azure Firewall, or virtual machine instance level public IPs may be interrupted when adding StandardV2 NAT gateway to a subnet. All net new outbound connections will use the StandardV2 NAT gateway.
0 commit comments