Тёмный
No video :(

Solutions for Overlapping IP addresses in Azure (VPN Gateway NAT / Private Link Service) 

Adam Stuart
Подписаться 3,7 тыс.
Просмотров 9 тыс.
50% 1

Опубликовано:

 

22 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 24   
@rodrigo16medeiros
@rodrigo16medeiros Год назад
This is the kind of video I like the most, that shows how things work behind the scenes. Thank you for the effort to make things clear!
@ketanshah9082
@ketanshah9082 8 месяцев назад
Thank you so much Adam Sir! Videos like these help understand the concepts much easier than reading articles alone. Appreciate all your efforts!
@punneethkammili
@punneethkammili Год назад
Extremely useful Video Adam. Solved many client worries for us.
@QuickHits
@QuickHits Год назад
An excellent explanation. Absolutely brialliantly clear. (Mark G - Microsoft)
@georgeollis
@georgeollis 2 года назад
Great video as always Adam.
@gowthaman.s
@gowthaman.s Год назад
thank you .technically very informative as a network engineer
@MrOcsicman
@MrOcsicman Год назад
Great scenario walk-through, explains the dual-NAT process very well. Question I have is would this work for multiple 3rd party sites connecting into the same VPNGW, who have the same overlapping IP address space or would a vendor based NVA solution be more suitable? (Trying to avoid sharing the BGP routing table with all these potential 3rd parties as well) Just trying to develop a pattern which will scale without causing NAT and routing challenges later. Love the material and scenario's you are covering here and in GitHub...keep it up! :)
@benjaminmarch3420
@benjaminmarch3420 8 месяцев назад
If you ever found a good, scalable way to do this that doesn't share the BGP routing table for your whole trusted network, I would love to know - cheers
@5ive762
@5ive762 2 года назад
Awsome Tutorial
@christopherjohnson1766
@christopherjohnson1766 6 месяцев назад
Question about the public IPs used -- if BGP is advertising a route for the entire 100.0.0.0/24, does that break traffic from on-prem resources to any other host on the internet on that subnet?
@adrianromero1615
@adrianromero1615 Месяц назад
Very nice, but you are not showing the local network gateway configuration which is kind of confusing on how the onprem info is set. Can you update on that?
@HelvertonJunior-ux9hl
@HelvertonJunior-ux9hl 3 месяца назад
Hi Adam. I'm having a problem when I configure NAT on the Azure VPN gateway from a 10.70.0.0/20 network to a 100.70.0.0/20 network. When I configure this 100.70.0.0/20 network inside the firewall, it doesn't work. The NAT only works if I also enter the 10.70.0.0/20 network into the local firewall (Fortigate). However, since these networks already exist, I can't enter the entire range into the firewall. I only configured an static egress rule in the NAT.
@papablopopo
@papablopopo Год назад
Thanks Adam
@denisdm91
@denisdm91 2 года назад
very useful video, thank you! :) one question: what if we didn't have a spoke network, and it was the hub network in overlay?
@AdamStuart1
@AdamStuart1 2 года назад
It would still work fine in that scenario, I used a separate spoke to make it a little clearer, and allow easier connect/disconnect.
@wearewhoweare6602
@wearewhoweare6602 9 месяцев назад
These Nated IPs do I just use any IP or I would have to created a public IP or a private subnet IP to be used for this. How did you get these Nated IPs
@francescorusso5982
@francescorusso5982 Год назад
Great video, but I have a question: how do you make sure on-prem resources can resolve Azure VMs with on-prem IPs ? The on-prem DNS is not aware of NAT
@AdamStuart1
@AdamStuart1 Год назад
This is certainly not something you should be rolling out en masse, rather something to get you out of a hole. Agree DNS is a concern which is going to require manual work. In my experience, this is for connections between third parties, who are generally runnning their own DNS infra anyway.
@nomnoomz
@nomnoomz 9 месяцев назад
Thanks, I got it working using private services. Now, if I want to reach the the On-prem from the Private Link Service, is that possible?
@nomnoomz
@nomnoomz 5 месяцев назад
I been having the same question, I don’t think is possible. I recall it’s a one way connection
@sat5812
@sat5812 Год назад
Hi Adam i am using vpngw1 sku which doesn't support nat rules not the second method its only for one vm not for entire resources. Route tables not suggested by azure for vpn gateway. Any suggestions from you.
@deepakchughCoolman
@deepakchughCoolman Год назад
Such awesome work! One query which keeps on hitting my mind. how this mapping happens on backend. Lets say if have couple to backend IPs to be reached. which corresponds NATTED IP to be reached from other side. Can some one please help to understand.
@AdamStuart1
@AdamStuart1 Год назад
Please elaborate on your question.
Далее
IPsec Site-to-Site VPN over Azure ExpressRoute
15:16
#JasonStatham being iconic
00:38
Просмотров 202 тыс.
💀СЛОМАЛ Айфон за 5 СЕКУНД😱
00:26
NAT and NAT Gateway in Azure
21:38
Просмотров 24 тыс.
Microsoft Azure Private Link Deep Dive
57:02
Просмотров 93 тыс.
are these ip addresses on same subnet?
10:59
Просмотров 8 тыс.
CCIE and Cloud - is it still worth it?
49:37
Просмотров 6 тыс.
Site-to-Site Azure VPN with a Windows RRAS Server
25:14
ExpressRoute resilience - common design errors
24:30
Просмотров 2,3 тыс.