Skip to content

Commit 703117c

Browse files
authored
Merge pull request #313295 from Xelu86/preparenetwork
[Update] Prepare a network for infrastructure deployment
2 parents ffd37de + 01b81d6 commit 703117c

1 file changed

Lines changed: 71 additions & 72 deletions

File tree

Lines changed: 71 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,38 @@
11
---
2-
title: Prepare network for infrastructure deployment
3-
description: Learn how to prepare a network for use with an S/4HANA infrastructure deployment with Azure Center for SAP solutions through the Azure portal.
2+
title: Prepare a network for infrastructure deployment
3+
description: Learn how to prepare a virtual network for an S/4HANA infrastructure deployment with Azure Center for SAP solutions.
44
ms.service: sap-on-azure
55
ms.subservice: center-sap-solutions
66
ms.topic: how-to
7-
ms.date: 10/19/2022
7+
ms.date: 03/17/2026
88
author: sagarkeswani
99
ms.author: sagarkeswani
10-
#Customer intent: As a developer, I want to create a virtual network so that I can deploy S/4HANA infrastructure in Azure Center for SAP solutions.
1110
# Customer intent: As a network administrator, I want to configure a virtual network and its components for S/4HANA deployment, so that I can ensure proper connectivity and security for the infrastructure on Azure.
1211
---
1312

14-
# Prepare network for infrastructure deployment
13+
# Prepare a network for infrastructure deployment
1514

15+
[Azure Center for SAP solutions](overview.md) lets you deploy and manage SAP systems on Azure. When you deploy S/4HANA infrastructure through the service, you need a virtual network that provides outbound connectivity and allows communication between application and database subnets. Without a properly configured network, the infrastructure deployment and SAP software installation can fail.
1616

17+
In this article, you create and configure a virtual network, set up connectivity and security rules, and allow list the endpoints that the deployment requires. Your specific network settings depend on your environment and use case.
1718

18-
In this how-to guide, you'll learn how to prepare a virtual network to deploy S/4 HANA infrastructure using *Azure Center for SAP solutions*. This article provides general guidance about creating a virtual network. Your individual environment and use case will determine how you need to configure your own network settings for use with a *Virtual Instance for SAP (VIS)* resource.
19-
20-
If you have an existing network that you're ready to use with Azure Center for SAP solutions, [go to the deployment guide](deploy-s4hana.md) instead of following this guide.
19+
If you already have a network that's ready to use with Azure Center for SAP solutions, [go to the deployment guide](deploy-s4hana.md) instead.
2120

2221
## Prerequisites
2322

2423
- An Azure subscription.
25-
- [Review the quotas for your Azure subscription](/azure/quotas/view-quotas). If the quotas are low, you might need to create a support request before creating your infrastructure deployment. Otherwise, you might experience deployment failures or an **Insufficient quota** error.
26-
- It's recommended to have multiple IP addresses in the subnet or subnets before you begin deployment. For example, it's always better to have a `/26` mask instead of `/29`.
27-
- The names including AzureFirewallSubnet, AzureFirewallManagementSubnet, AzureBastionSubnet and GatewaySubnet are reserved names within Azure. Please do not use these as the subnet names.
28-
- Note the SAP Application Performance Standard (SAPS) and database memory size that you need to allow Azure Center for SAP solutions to size your SAP system. If you're not sure, you can also select the VMs. There are:
29-
- A single or cluster of ASCS VMs, which make up a single ASCS instance in the VIS.
30-
- A single or cluster of Database VMs, which make up a single Database instance in the VIS.
31-
- A single Application Server VM, which makes up a single Application instance in the VIS. Depending on the number of Application Servers being deployed or registered, there can be multiple application instances.
24+
- Sufficient [quotas for your Azure subscription](/azure/quotas/view-quotas). If the quotas are low, create a support request before creating your infrastructure deployment. Otherwise, you might experience deployment failures or an **Insufficient quota** error.
25+
- Have multiple IP addresses in the subnet or subnets before you begin deployment. For example, it's better to have a `/26` mask instead of `/29`.
26+
- The names **AzureFirewallSubnet**, **AzureFirewallManagementSubnet**, **AzureBastionSubnet**, and **GatewaySubnet** are reserved names within Azure (don't use these names as subnet names).
27+
- Knowledge of the SAP Application Performance Standard (SAPS) and database memory size that you need so that Azure Center for SAP solutions can size your SAP system. If you're not sure, you can also select the virtual machines (VMs). The following VM types are used:
28+
29+
- A single Advanced Business Application Programming Central Services (ASCS) VM or a cluster of ASCS VMs, which make up a single ASCS instance in the VIS.
30+
- A single database VM or a cluster of database VMs, which make up a single database instance in the VIS.
31+
- A single Application Server VM, which makes up a single Application instance in the VIS. Depending on the number of Application Servers being deployed or registered, there can be multiple application instances.
3232

33-
## Create network
33+
## Create a network
3434

35-
You must create a network for the infrastructure deployment on Azure. Make sure to create the network in the same region that you want to deploy the SAP system.
35+
Create a network for the infrastructure deployment on Azure. Make sure to create the network in the same region where you want to deploy the SAP system.
3636

3737
Some of the required network components are:
3838

@@ -42,19 +42,19 @@ Some of the required network components are:
4242
- Route tables
4343
- Firewalls (or NAT Gateway)
4444

45-
For more information, see the [example network configuration](#example-network-configuration).
45+
For more information, see [Configure an example network](#configure-an-example-network).
4646

47-
## Connect network
47+
## Connect the network
4848

49-
At a minimum, the network needs to have outbound internet connectivity for successful infrastructure deployment and software installation. The application and database subnets also need to be able to communicate with each other.
49+
At a minimum, the network must have outbound internet connectivity for successful infrastructure deployment and software installation. The application and database subnets must also be able to communicate with each other.
5050

51-
If internet connectivity isn't possible, allowlist the IP addresses for the following areas:
51+
If internet connectivity isn't possible, allow list the IP addresses for the following areas:
5252

53-
- [SUSE or Red Hat endpoints](#allowlist-suse-or-red-hat-endpoints)
54-
- [Azure Storage accounts](#allowlist-storage-accounts)
55-
- [Allowlist Azure Key Vault](#allowlist-key-vault)
56-
- [Allowlist Microsoft Entra ID](#allowlist-azure-ad)
57-
- [Allowlist Azure Resource Manager](#allowlist-azure-resource-manager)
53+
- [SUSE or Red Hat endpoints](#allow-list-suse-or-red-hat-endpoints)
54+
- [Azure Storage accounts](#allow-list-storage-accounts)
55+
- [Allow list an Azure Key Vault](#allow-list-a-key-vault)
56+
- [Allow list a Microsoft Entra ID](#allow-list-a-microsoft-entra-id)
57+
- [Allow list an Azure Resource Manager](#allow-list-an-azure-resource-manager)
5858

5959
Then, make sure all resources within the virtual network can connect to each other. For example, [configure a network security group](../../virtual-network/manage-network-security-group.md#work-with-network-security-groups) to allow resources within the virtual network to communicate by listening on all ports.
6060

@@ -64,59 +64,57 @@ Then, make sure all resources within the virtual network can connect to each oth
6464

6565
If it's not possible to allow the resources within the virtual network to connect to each other, allow connections between the application and database subnets, and [open important SAP ports in the virtual network](#open-important-sap-ports) instead.
6666

67-
### Allowlist SUSE or Red Hat endpoints
67+
### Allow list SUSE or Red Hat endpoints
6868

69-
If you're using SUSE for the VMs, [allowlist the SUSE endpoints](https://www.suse.com/c/azure-public-cloud-update-infrastructure-101/). For example:
69+
If you're using SUSE for the VMs, [allow list the SUSE endpoints](https://www.suse.com/c/azure-public-cloud-update-infrastructure-101/). For example:
7070

71-
1. Create a VM with any OS [using the Azure portal](/azure/virtual-machines/linux/quick-create-portal) or [using Azure Cloud Shell](../../cloud-shell/overview.md). Or, install *openSUSE Leap* from the Microsoft Store and enable WSL.
72-
1. Install *pip3* by running `zypper install python3-pip`.
73-
1. Install the *pip* package *susepubliccloudinfo* by running `pip3 install susepubliccloudinfo`.
71+
1. Create a VM with any OS [by using the Azure portal](/azure/virtual-machines/linux/quick-create-portal) or [by using Azure Cloud Shell](../../cloud-shell/overview.md). Or, install openSUSE Leap from the Microsoft Store and enable Windows Subsystem for Linux.
72+
1. Install `pip3` by running `zypper install python3-pip`.
73+
1. Install the `pip` package `susepubliccloudinfo` by running `pip3 install susepubliccloudinfo`.
7474
1. Get a list of IP addresses to configure in the network and firewall by running `pint microsoft servers --json --region` with the appropriate Azure region parameter.
75-
1. Allowlist all these IP addresses on the firewall or network security group where you're planning to attach the subnets.
75+
1. Allow list all these IP addresses on the firewall or network security group where you plan to attach the subnets.
7676

77-
If you're using Red Hat for the VMs, [allowlist the Red Hat endpoints](/azure/virtual-machines/workloads/redhat/redhat-rhui#the-ips-for-the-rhui-content-delivery-servers) as needed. The default allowlist is the Azure Global IP addresses. Depending on your use case, you might also need to allowlist Azure US Government or Azure Germany IP addresses. Configure all IP addresses from your list on the firewall or the network security group where you want to attach the subnets.
77+
If you're using Red Hat for the VMs, [allow list the Red Hat endpoints](/azure/virtual-machines/workloads/redhat/redhat-rhui#the-ips-for-the-rhui-content-delivery-servers) as needed. The default allow list is the Azure Global IP addresses. Depending on your use case, you might also need to allow list Azure US Government or Azure Germany IP addresses. Configure all IP addresses from your list on the firewall or the network security group where you want to attach the subnets.
7878

79-
### Allowlist storage accounts
79+
### Allow list storage accounts
8080

8181
Azure Center for SAP solutions needs access to the following storage accounts to install SAP software correctly:
8282

83-
- The storage account where you're storing the SAP media that is required during software installation.
83+
- The storage account where you store the SAP media required during software installation.
8484
- The storage account created by Azure Center for SAP solutions in a managed resource group, which Azure Center for SAP solutions also owns and manages.
8585

8686
There are multiple options to allow access to these storage accounts:
8787

8888
- Allow internet connectivity
8989
- Configure a [**Storage** service tag](../../virtual-network/service-tags-overview.md#available-service-tags)
9090
- Configure [**Storage** service tags](../../virtual-network/service-tags-overview.md#available-service-tags) with regional scope. Make sure to configure tags for the Azure region where you're deploying the infrastructure, and where the storage account with the SAP media exists.
91-
- Allowlist the regional [Azure IP ranges](https://www.microsoft.com/en-us/download/details.aspx?id=56519).
91+
- Allow list the regional [Azure IP ranges](https://www.microsoft.com/download/details.aspx?id=56519).
9292

93-
### Allowlist Key Vault
93+
### Allow list a Key Vault
9494

95-
Azure Center for SAP solutions creates a key vault to store and access the secret keys during software installation. This key vault also stores the SAP system password. To allow access to this key vault, you can:
95+
Azure Center for SAP solutions creates a key vault to store and access the secret keys during software installation. This key vault also stores the SAP system password. To allow access to this key vault:
9696

9797
- Allow internet connectivity
98-
- Configure a [**AzureKeyVault** service tag](../../virtual-network/service-tags-overview.md#available-service-tags)
98+
- Configure an [**AzureKeyVault** service tag](../../virtual-network/service-tags-overview.md#available-service-tags)
9999
- Configure an [**AzureKeyVault** service tag](../../virtual-network/service-tags-overview.md#available-service-tags) with regional scope. Make sure to configure the tag in the region where you're deploying the infrastructure.
100100

101-
<a name='allowlist-azure-ad'></a>
102-
103-
### Allowlist Microsoft Entra ID
101+
### Allow list a Microsoft Entra ID
104102

105-
Azure Center for SAP solutions uses Microsoft Entra ID to get the authentication token for obtaining secrets from a managed key vault during SAP installation. To allow access to Microsoft Entra ID, you can:
103+
Azure Center for SAP solutions uses Microsoft Entra ID to get an authentication token for obtaining secrets from a managed key vault during SAP installation. To allow access to Microsoft Entra ID:
106104

107105
- Allow internet connectivity
108106
- Configure an [**AzureActiveDirectory** service tag](../../virtual-network/service-tags-overview.md#available-service-tags).
109107

110-
### Allowlist Azure Resource Manager
108+
### Allow list an Azure Resource Manager
111109

112-
Azure Center for SAP solutions uses a managed identity for software installation. Managed identity authentication requires a call to the Azure Resource Manager endpoint. To allow access to this endpoint, you can:
110+
Azure Center for SAP solutions uses a managed identity for software installation. Managed identity authentication requires a call to the Azure Resource Manager endpoint. To allow access to this endpoint:
113111

114112
- Allow internet connectivity
115113
- Configure an [**AzureResourceManager** service tag](../../virtual-network/service-tags-overview.md#available-service-tags).
116114

117115
### Open important SAP ports
118116

119-
If you're unable to [allow connection between all resources in the virtual network](#connect-network) as previously described, you can open important SAP ports in the virtual network instead. This method allows resources within the virtual network to listen on these ports for communication purposes. If you're using more than one subnet, these settings also allow connectivity within the subnets.
117+
If you're unable to [allow connections between all resources in the virtual network](#connect-the-network) as previously described, you can open important SAP ports in the virtual network instead. This method allows resources within the virtual network to listen on these ports for communication. If you're using more than one subnet, these settings also allow connectivity between the subnets.
120118

121119
Open the SAP ports listed in the following table. Replace the placeholder values (`xx`) in applicable ports with your SAP instance number. For example, if your SAP instance number is `01`, then `32xx` becomes `3201`.
122120

@@ -131,60 +129,61 @@ Open the SAP ports listed in the following table. Replace the placeholder values
131129
| Control agent | 5xx13, 5xx14 | Yes | No | Stop, start, and get status of SAP system. |
132130
| SAP installation | 4237 | Yes | No | Initial SAP installation. |
133131
| HTTP and HTTPS | 5xx00, 5xx01 | Yes | Yes | HTTP/S server port. |
134-
| IIOP | 5xx02, 5xx03, 5xx07 | Yes | Yes | Service request port. |
132+
| Internet Inter-ORB Protocol (IIOP) | 5xx02, 5xx03, 5xx07 | Yes | Yes | Service request port. |
135133
| P4 | 5xx04-6 | Yes | Yes | Service request port. |
136134
| Telnet | 5xx08 | Yes | No | Service port for management. |
137-
| SQL communication | 3xx13, 3xx15, 3xx40-98 | Yes | No | Database communication port with application, including ABAP or JAVA subnet. |
135+
| SQL communication | 3xx13, 3xx15, 3xx40-98 | Yes | No | Database communication port with application, including Advanced Business Application Programming (ABAP) or JAVA subnet. |
138136
| SQL server | 1433 | Yes | No | Default port for MS-SQL in SAP; required for ABAP or JAVA database communication. |
139137
| HANA XS engine | 43xx, 80xx | Yes | Yes | HTTP/S request port for web content. |
140138

141-
## Example network configuration
139+
## Configure an example network
142140

143141
The configuration process for an example network might include:
144142

145143
1. Create a virtual network, or use an existing virtual network.
146144

147145
1. Create the following subnets inside the virtual network:
148146

149-
1. An application tier subnet.
147+
1. An application tier subnet.
150148

151-
1. A database tier subnet.
149+
1. A database tier subnet.
152150

153-
1. A subnet for use with the firewall, named **Azure FirewallSubnet**.
151+
1. A subnet for use with the firewall, named **AzureFirewallSubnet**.
154152

155153
1. Create a new firewall resource:
156154

157-
1. Attach the firewall to the virtual network.
155+
1. Attach the firewall to the virtual network.
158156

159-
1. Create a rule to allowlist RHEL or SUSE endpoints. Make sure to allow all source IP addresses (`*`), set the source port to **Any**, allow the destination IP addresses for RHEL or SUSE, and set the destination port to **Any**.
157+
1. Create a rule to allow list RHEL or SUSE endpoints. Make sure to allow all source IP addresses (`*`), set the source port to **Any**, allow the destination IP addresses for RHEL or SUSE, and set the destination port to **Any**.
160158

161-
1. Create a rule to allow service tags. Make sure to allow all source IP addresses (`*`), set the destination type to **Service tag**. Then, allow the tags **Microsoft.Storage**, **Microsoft.KeyVault**, **AzureResourceManager** and **Microsoft.AzureActiveDirectory**.
159+
1. To allow service tags, create a rule. Make sure to allow all source IP addresses (`*`), set the destination type to **Service tag**. Then, allow the tags **Microsoft.Storage**, **Microsoft.KeyVault**, **AzureResourceManager**, and **Microsoft.AzureActiveDirectory**.
162160

163161
1. Create a route table resource:
164162

165-
1. Add a new route of the type **Virtual Appliance**.
163+
1. Add a new route of the type **Virtual Appliance**.
166164

167-
1. Set the IP address to the firewall's IP address, which you can find on the overview of the firewall resource in the Azure portal.
165+
1. Set the IP address to the firewall's IP address, which you can find on the **Overview** page of the firewall resource in the Azure portal.
168166

169167
1. Update the subnets for the application and database tiers to use the new route table.
170168

171169
1. If you're using a network security group with the virtual network, add the following inbound rule. This rule provides connectivity between the subnets for the application and database tiers.
172170

173-
| Priority | Port | Protocol | Source | Destination | Action |
174-
| -------- | ---- | -------- | ------ | ----------- | ------ |
175-
| 100 | Any | Any | virtual network | virtual network | Allow |
171+
| Priority | Port | Protocol | Source | Destination | Action |
172+
| -------- | ---- | -------- | ------ | ----------- | ------ |
173+
| 100 | Any | Any | virtual network | virtual network | Allow |
176174

177175
1. If you're using a network security group instead of a firewall, add outbound rules to allow installation.
178176

179-
| Priority | Port | Protocol | Source | Destination | Action |
180-
| -------- | ---- | -------- | ------ | ----------- | ------ |
181-
| 110 | Any | Any | Any | SUSE or Red Hat endpoints | Allow |
182-
| 115 | Any | Any | Any | Azure Resource Manager | Allow |
183-
| 116 | Any | Any | Any | Microsoft Entra ID | Allow |
184-
| 117 | Any | Any | Any | Storage accounts | Allow |
185-
| 118 | 8080 | Any | Any | Key vault | Allow |
186-
| 119 | Any | Any | Any | virtual network | Allow |
187-
188-
## Next steps
189-
190-
- [Deploy S/4HANA infrastructure](deploy-s4hana.md)
177+
| Priority | Port | Protocol | Source | Destination | Action |
178+
| -------- | ---- | -------- | ------ | ----------- | ------ |
179+
| 110 | Any | Any | Any | SUSE or Red Hat endpoints | Allow |
180+
| 115 | Any | Any | Any | Azure Resource Manager | Allow |
181+
| 116 | Any | Any | Any | Microsoft Entra ID | Allow |
182+
| 117 | Any | Any | Any | Storage accounts | Allow |
183+
| 118 | 8080 | Any | Any | Key vault | Allow |
184+
| 119 | Any | Any | Any | virtual network | Allow |
185+
186+
## Next step
187+
188+
> [!div class="nextstepaction"]
189+
> [Deploy S/4HANA infrastructure](deploy-s4hana.md)

0 commit comments

Comments
 (0)