You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Created a directory for Time Trigger and moved the related files.
* Created a requirements.psd1 file to download the required modules.
* Added information on the following issue.
No parameter defined in the script or function for the input binding 'Timer'.Stack: · Issue Azure#7 · Azure/ha-nva-fo
Azure#7
* The Resoruce Group of Meraki vMX is created on a per-instance basis. Therefore, the variable FWRGNAME is divided into FW1RGNAME and FW2RGNAME.
* Added Meraki-specific supplementary information to README.
Copy file name to clipboardExpand all lines: README.md
+32-21Lines changed: 32 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
# Automated failover for network virtual appliances:
2
-
## Supporting high availability with user-defined route tables on Microsoft Azure
2
+
## Supporting high availability with user-defined route tables on Microsoft Azure (Apply patch for Meraki vMX)
3
3
4
4
This guide shows you how to implement high availability for network virtual appliance (NVA) firewalls using custom route tables that direct traffic through
5
5
an active-passive NVA configuration. These user-defined routes (UDRs) override the Azure default system routes by directing traffic to the active NVA firewall in an active-passive pair. If the active NVA firewall fails for some reason, whether through a planned or unplanned outage, the route can failover to the secondary NVA firewall.
@@ -51,7 +51,10 @@ To set up the Azure resources:
51
51
52
52
2. Take note of the service principal application ID, key value, and Azure Active Directory tenant ID. You will need these to set up Azure Functions later.
53
53
54
-
3.[Assign RBAC permissions to the service principal](https://docs.microsoft.com/azure/active-directory/role-based-access-control-configure) for each Azure resource group. For the resource group containing the NVA firewall virtual machines, assign the **Reader** role. For the resource group(s) containing route table resources, assign the **Contributor** role.
54
+
3.[Assign RBAC permissions to the service principal](https://docs.microsoft.com/azure/active-directory/role-based-access-control-configure) for Azure **subscription** and **resource group**.
55
+
1. For the **subscription** containing the NVA firewall virtual machines, assign the **Reader** role.
56
+
Meraki vMX's resource group has limited privileges to change the settings, so we will configure the settings for the higher level subscription.
57
+
2. For the **resource group(s)** containing route table resources, assign the **Contributor** role.
55
58
56
59
4.[Configure the resource tag name and value](https://docs.microsoft.com/azure/azure-resource-manager/resource-group-using-tags#portal) for each route table resource managed by the function app using the following:
57
60
@@ -94,23 +97,25 @@ To create, configure, and deploy the function app:
94
97
95
98
4. Click [Application settings](https://docs.microsoft.com/azure/azure-functions/functions-how-to-use-azure-function-app-settings#settings) and add the following variables and values:
0 commit comments