Skip to content

Commit cd5ffd0

Browse files
authored
Update c2cprivatenetworking.md
1 parent c19aec6 commit cd5ffd0

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

articles/storage-mover/c2cprivatenetworking.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ For a detailed walkthrough of multi-tunnel BGP between Azure VPN Gateway and AWS
8383

8484
Example custom IPsec/IKE settings (validate against your device compatibility): **GCMAES256** for IPsec encryption/integrity, **SHA256** for IKE integrity, **DHGroup14**, **PFS2048**.
8585

86-
![](media/image1.png)
86+
:::image type="content" source="./media/c2c-networking/ipsec-policy.png" alt-text="Screenshot of the Project Explorer page with the Create a Project pane's fields visible." lightbox="./media/c2c-networking/ipsec-policy.png":::
8787

8888
**Learn more:** [Configure custom IPsec/IKE connection policies](https://docs.azure.cn/en-us/vpn-gateway/ipsec-ike-policy-howto).
8989

@@ -161,7 +161,7 @@ An AWS VPC endpoint (VPCE) for S3 lets your VPC reach S3 privately. For this des
161161
2. Create an **interface** VPCE for **Amazon S3** in the target VPC and subnets, and enable **private DNS**.
162162
3. Configure VPCE and bucket policies to allow only required S3 actions and (optionally) restrict access to the specific endpoint using **aws:SourceVpce**.
163163

164-
* ![](media/image2.png)
164+
:::image type="content" source="./media/c2c-networking/vpce-policy.png" alt-text="Screenshot of the Project Explorer page with the Create a Project pane's fields visible." lightbox="./media/c2c-networking/vpce-policy.png":::
165165

166166
Example: S3 bucket policy restricted to a specific VPCE.
167167

@@ -210,13 +210,14 @@ After creating the Direct Connect resource, create a private connection in Stora
210210

211211
### Cloud-to-cloud migration flow (private networking)
212212

213-
![](media/image4.png)
213+
:::image type="content" source="./media/c2c-networking/private-network-architcture.png" alt-text="Image of Network Architecture" lightbox="./media/c2c-networking/private-network-architcture.png":::
214214

215215
*Note: Above diagram shown with private networking to AWS but same applies for other private networking scenarios.*
216216

217217
### Cloud-to-cloud migration flow (public S3 bucket to Blob)
218218

219-
![](media/image5.png)
219+
:::image type="content" source="./media/c2c-networking/publics3-to-blob-architcture.png" alt-text="Image of Network Architecture" lightbox="./media/c2c-networking/publics3-to-blob-architcture.png":::
220+
220221

221222
## Troubleshooting
222223

@@ -232,16 +233,14 @@ After creating the Direct Connect resource, create a private connection in Stora
232233
* **Audit Action Permissions:** Ensure the `Action` element in the VPCE policy permits necessary operations. At a minimum, `s3:Get*` and `s3:List*` are required for reading and browsing data.
233234
* **Policy Logic:** If using a custom policy, ensure there are no "Deny" statements that inadvertently override the "Allow" statements for the Azure-sourced traffic.<br>
234235

235-
![](media/image2.png)
236+
:::image type="content" source="./media/c2c-networking/vpce-policy.png" alt-text="Screenshot of the Project Explorer page with the Create a Project pane's fields visible." lightbox="./media/c2c-networking/vpce-policy.png":::
236237

237238
### S3 bucket policy constraints
238239

239240
* **VPCE allow listing:** Check the S3 Bucket Policy for a `Condition` block. If the bucket restricts access, it must explicitly allow the `aws:SourceVpce` corresponding to the VPC Endpoint being used.
240241
* **Principal Access:** Ensure the IAM identity or the anonymous access (if applicable via VPCE) is not blocked by the bucket's Access Control List (ACL) or Public Access Block settings.
241242

242-
243-
244-
![](media/image3.png)
243+
:::image type="content" source="./media/c2c-networking/s3-bucket-policy.png" alt-text="Screenshot of the Project Explorer page with the Create a Project pane's fields visible." lightbox="./media/c2c-networking/s3-bucket-policy.png":::
245244

246245
### Regional alignment
247246

@@ -279,3 +278,4 @@ For BGP between Azure and AWS, follow: [Tutorial - Configure a BGP-enabled conne
279278

280279

281280

281+

0 commit comments

Comments
 (0)