Skip to content

Commit 64fe80f

Browse files
authored
Merge pull request #308995 from mbender-ms/ip-services-uuf494064
IP Services | Maintenance | UUF | Updated decision tree with missing decision question at end of tree
2 parents 8111e24 + f66c7bf commit 64fe80f

2 files changed

Lines changed: 9 additions & 9 deletions

File tree

articles/virtual-network/ip-services/default-outbound-access.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: mbender
77
ms.service: azure-virtual-network
88
ms.subservice: ip-services
99
ms.topic: concept-article
10-
ms.date: 09/01/2025
10+
ms.date: 12/03/2025
1111
# Customer intent: "As an Azure network administrator, I want to transition from default outbound access to explicit outbound connectivity for virtual machines, so that I can ensure secure and reliable internet access while avoiding potential disruptions from IP address changes."
1212
---
1313

@@ -46,7 +46,7 @@ Some examples of configurations that don't work when using default outbound acce
4646

4747
- Multiple NICs on a VM can yield inconsistent outbound IPs
4848
- Scaling Azure Virtual Machine Scale Sets can result in changing outbound IPs
49-
- Outbound IPs aren't consistent or contiguous across virtual machine scale set instances
49+
- Outbound IPs aren't consistent or contiguous across Virtual Machine Scale Set instances
5050

5151
Additionally,
5252

@@ -152,11 +152,11 @@ az network vnet subnet update --resource-group rgname --name subnetname --vnet-n
152152

153153
* In configurations using User Defined Routes (UDRs), any configured routes with [next hop type `Internet`](../virtual-networks-udr-overview.md#next-hop-types-across-azure-tools) break in a Private subnet.
154154

155-
* A common example is the use of a UDR to steer traffic to an upstream network virtual appliance/firewall, with exceptions for certain Azure Service Tags to bypass inspection.
155+
* A common example is the use of a UDR to steer traffic to an upstream network virtual appliance/firewall, with exceptions for certain Azure Service Tags to bypass inspection. This is done by configuring routes to these Service Tags with next hop type `Internet`. In this scenario you configure the following:
156156

157157
* A default route for the destination 0.0.0.0/0, with a next hop type of Virtual Appliance applies in the general case.
158158

159-
* One or more routes are configured to [Service Tag destinations](../virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) with next hop type `Internet`, to bypass the NVA/firewall. Unless an explicit outbound connectivity method is also configured for the source of the connection to these destinations, attempts to connect to these destinations fail, because default outbound access isn't available.
159+
* One or more routes are configured to [Service Tag destinations](../virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) with next hop type `Internet`, to bypass the NVA/firewall. Unless an explicit outbound connectivity method is also configured for the source of the connection to these destinations, attempts to connect to these destinations fail, because default outbound access isn't available by default in a Private subnet.
160160

161161
* This limitation doesn't apply to the use of Service Endpoints, which use a different next hop type `VirtualNetworkServiceEndpoint`. See [Virtual Network service endpoints](../virtual-network-service-endpoints-overview.md).
162162

@@ -182,15 +182,15 @@ az network vnet subnet update --resource-group rgname --name subnetname --vnet-n
182182

183183
#### Why do I see an alert showing I have a default outbound IP on my VM?
184184

185-
There's a NIC-level parameter (defaultOutboundConnectivityEnabled) which tracks if default outbound IP is allocated to a VM/VMSS instance. This is used to generate an Azure portal banner for VM/VMSS that flags this state. There are also specific Azure Advisor reccomendations with this information for your subscriptions. If you want to view which of your virtual machines or virtual machine scale sets have a default outbound IP assigned to them, follow these steps:
186-
1. Type in 'Advisor' into the search bar in the Azure portal and select on this option when it comes up.
185+
There's a NIC-level parameter (defaultOutboundConnectivityEnabled) which tracks if default outbound IP is allocated to a VM/Virtual Machine Scale Set instance. This is used to generate an Azure portal banner for VM/Virtual Machine Scale Set that flags this state. There are also specific Azure Advisor recommendations with this information for your subscriptions. If you want to view which of your virtual machines or Virtual Machine Scale Sets have a default outbound IP assigned to them, follow these steps:
186+
1. Type 'Advisor' into the search bar in the Azure portal and then select this option when it comes up.
187187
2. Select 'Operational Excellence'
188-
3. Look for the reccomendations 'Add explicit outbound method to disable default outbound' and/or 'Add explicit outbound method to disable default outbound for Virtual Machine Scale Sets' (note these are two different items)
189-
4. If either of these exist, select the respective reccomendation name and you will see the network interface cards (NICs) of all the virtual machnes/virtual machine scale set instances that have default outbound enabled.
188+
3. Look for the recommendations 'Add explicit outbound method to disable default outbound' and/or 'Add explicit outbound method to disable default outbound for Virtual Machine Scale Sets' (note these are two different items)
189+
4. If either of these exist, select the respective recommendation name and you will see the network interface cards (NICs) of all the virtual machnes/Virtual Machine Scale Set instances that have default outbound enabled.
190190

191191
#### How do I clear this alert?
192192

193-
1. An explicit method of outbound must be utilized for the flagged VM/VMSS. See the section above for different options.
193+
1. An explicit method of outbound must be utilized for the flagged VM/Virtual Machine Scale Set. See the section above for different options.
194194
2. The subnet should be made private to prevent new default outbound IPs from being created.
195195
3. Any applicable virtual machines in the subnet with the flag must be stopped and deallocated for the changes to be reflected in the NIC-level parameter and the flag to clear. (Note this is also true in the reverse; in order for a machine to be given a default outbound IP after having the subnet-level parameter set to false, a stop/deallocate of the virtual machine is required.)
196196

4.89 KB
Loading

0 commit comments

Comments
 (0)