Azure Local Outbound Connectivity

Comprehensive Guide to Public Path vs Private Path Architectures

What You'll Learn

  • Architecture Components: Understanding core components including Azure Local machines, Arc Gateway, proxies, and networking infrastructure
  • Traffic Categorization: Distinguishing between different types of network traffic and their routing paths
  • Configuration Steps: Setting up proxies, firewall rules, and Arc Gateway registration
  • Best Practices: When to use each architecture based on your requirements

Key Benefits of Arc Gateway

๐Ÿ”’

Better Security

Fewer open connections reduce the potential attack surface. Reduce firewall rules from hundreds to fewer than 30 endpoints.

โš™๏ธ

Easier Setup

Leverage your existing network and security infrastructure while the Arc Gateway manages Azure connectivity.

๐Ÿ“Š

Simpler Management

Fewer endpoints to manage means easier tracking and troubleshooting.

Architecture Comparison

Azure Local supports two primary outbound connectivity models. Arc Gateway is recommended to simplify and secure connectivity, but the key difference is how traffic reaches Azure services.

๐ŸŒ Public Path

4 Options

Traffic routes to Azure via public internet. Multiple configuration options available:

๐Ÿšง Coming Soon: Private Path is an upcoming feature not yet supported. Documentation is provided for planning purposes.

๐Ÿ” Private Path

Enhanced Security

Traffic routes through Arc Gateway via ExpressRoute or Site-to-Site VPN.

  • Azure Firewall Explicit Proxy
  • No public internet exposure
  • Private connectivity to Azure

Detailed Comparison

Aspect Public Path Private Path
Internet Exposure Required (outbound) None
Primary Connectivity Public endpoints via Arc Gateway ExpressRoute or Site-to-Site VPN
Enterprise Proxy Location On-premises (optional) Azure Firewall Explicit Proxy (in Azure)
Firewall Location On-premises firewall Azure Firewall (in Azure VNET)
Arc Gateway โœ… Optional (recommended) โœ… Yes
Cluster IP:40343 โœ… For ARB/AKS โœ… For ARB/AKS
Private Endpoints โœ… Supported โœ… Supported
๏ฟฝ Arc Private Link โŒ โŒ
๐Ÿ” Key Vault โœ… โœ…
๐Ÿ’พ Storage (Blob) โœ… โœ…
๐Ÿ“ฆ Azure Container Registry โœ… โœ…
๐Ÿ”„ Azure Site Recovery โœ… โœ…
๐Ÿ—„๏ธ Recovery Services Vault (Backup) โœ… โœ…
๐Ÿ—ƒ๏ธ SQL Managed Instance โœ… โœ…
๐Ÿ›ก๏ธ Microsoft Defender for Cloud โœ… โœ…
TLS Inspection โŒ Not supported โŒ Not supported
Setup Complexity Lower Higher
Cost Lower Higher (ExpressRoute + Azure Firewall)

๐Ÿ“Œ Important Note on Private Endpoints

Private Endpoints (Private Link) are architecture-agnostic. They work identically in both Public Path and Private Path architectures. The configuration is the same - you add Private Link endpoints to the proxy bypass list so traffic goes directly to them.

Components Overview

๐ŸŒ Public Path

Traffic routed through the Arc Gateway to Azure services via the public internet. Your on-premises enterprise proxy and firewall control the traffic flow.

Public Path - Components Overview

๐Ÿ” Private Path

Traffic routed securely through private connections (ExpressRoute or Site-to-Site VPN) to Azure, eliminating public internet exposure.

Private Path - Components Overview

๐Ÿ” What Makes Private Path "Private"

  1. Azure Firewall Explicit Proxy is the enterprise proxy (hosted in Azure, not on-prem)
  2. Arc Gateway routes through private connection (ExpressRoute/VPN)
  3. No public internet exposure for Azure Local traffic
  4. Unified private connectivity โ€” combine private endpoints for Azure PaaS services (Storage, Key Vault, etc.) with fully private Arc and Entra traffic over ExpressRoute

๐ŸŒ What Makes Public Path "Public"

  1. On-premises Enterprise Proxy handles all outbound traffic from Azure Local
  2. Arc Gateway routes through the public internet to Azure services
  3. Enterprise firewall controls and inspects traffic before leaving your network
  4. Hybrid private endpoints โ€” while Arc and Entra traffic uses public internet, you can still use private endpoints for Azure PaaS services (Storage, Key Vault) if you have ExpressRoute or Site-to-Site VPN connectivity

When to Use Each Architecture

Choose Public Path When:

  • โœ… You have reliable internet connectivity
  • โœ… You already have on-premises proxy/firewall infrastructure
  • โœ… Public internet egress is acceptable per your security policies
  • โœ… Simpler initial setup is preferred
  • โœ… Cost optimization (no ExpressRoute/VPN required)

Choose Private Path When:

  • โœ… Zero public internet exposure is required
  • โœ… Regulatory/compliance requirements mandate private connectivity
  • โœ… You already have ExpressRoute or Site-to-Site VPN
  • โœ… Centralized Azure-based security management is preferred
  • โœ… High-security environments (government, healthcare, financial)

Summary

Both architectures can leverage the Arc Gateway to reduce firewall rules from hundreds to fewer than 30 endpoints. The key differentiator is:

  • Public Path: Uses on-premises proxy/firewall with public internet egress
  • Private Path: Uses Azure Firewall Explicit Proxy with ExpressRoute/VPN (no public internet)

Private Endpoints are configured identically in both architectures - they're architecture-agnostic.

Private Endpoints Usage Across Deployment Scenarios

Azure Local supports multiple deployment scenarios with varying proxy and Arc Gateway configurations. Private Endpoints (Private Link) work across all scenarios but require proper proxy bypass configuration.

๐ŸŒ Public Path - 4 Options

When using public internet for Azure connectivity, you have four deployment options:

1

No Proxy, No Arc Gateway

Direct connection to Azure through firewall only. Requires opening all Azure endpoints in firewall.

No Proxy, No Arc Gateway
Key Characteristics:
  • Proxy: None
  • Arc Gateway: Not used
  • Connectivity: Direct to public internet
  • Firewall Rules: Hundreds of endpoints required
โœ… Simplest setup

No proxy configuration needed

โŒ Most firewall rules

Hundreds of endpoints to manage

2

Proxy, No Arc Gateway

Traffic routes through enterprise proxy. Proxy handles URL filtering and logging.

Proxy, No Arc Gateway
Key Characteristics:
  • Proxy: On-premises enterprise proxy
  • Arc Gateway: Not used
  • Connectivity: Through proxy to public internet
  • Firewall Rules: Many endpoints required
โœ… Centralized control

Proxy provides visibility and filtering

โŒ Many endpoints

Still requires many firewall/proxy rules

3

No Proxy, Arc Gateway

Arc Gateway handles Azure connectivity. Reduces firewall rules to fewer than 30 endpoints.

No Proxy, Arc Gateway
Key Characteristics:
  • Proxy: None
  • Arc Gateway: Handles HTTPS traffic to Azure
  • Connectivity: Arc Gateway to public internet
  • Firewall Rules: Fewer than 30 endpoints
โœ… Simplified rules

Fewer than 30 endpoints needed

โŒ No HTTP proxy

HTTP traffic goes direct to firewall

4

Proxy with Arc Gateway

Best of both worlds: Arc Gateway for HTTPS to Azure, enterprise proxy for HTTP and third-party traffic.

Proxy with Arc Gateway
Key Characteristics:
  • Proxy: On-premises enterprise proxy
  • Arc Gateway: Handles HTTPS traffic to Azure
  • Connectivity: Arc Gateway + Proxy to public internet
  • Firewall Rules: Fewer than 30 endpoints
โœ… Best security

Minimal rules + proxy control

โœ… Full visibility

All traffic is managed

๐Ÿ” Private Path - 1 Option

When using ExpressRoute/VPN for private Azure connectivity, there is only one supported configuration:

โ˜…

Azure Firewall Explicit Proxy + Arc Gateway

Only Option

All traffic routes through ExpressRoute/VPN to Azure Firewall Explicit Proxy, with Arc Gateway providing the secure tunnel to Azure services.

Azure Firewall Explicit Proxy with Arc Gateway
Key Characteristics:
  • Proxy: Azure Firewall Explicit Proxy (in Azure VNET)
  • Arc Gateway: Required for HTTPS traffic to Azure
  • Connectivity: ExpressRoute or Site-to-Site VPN
  • Internet: No public internet exposure
โœ… Maximum security

No public internet exposure

โœ… Centralized management

Azure Firewall policies

โœ… Compliance ready

Meets strict regulatory requirements

โš ๏ธ Why Only One Option?

The Private Path architecture requires:

  • Azure Firewall Explicit Proxy - to serve as the enterprise proxy hosted in Azure
  • Arc Gateway - to create secure tunnels for HTTPS traffic
  • ExpressRoute/VPN - to provide private connectivity

Any variation from this architecture is not validated or supported by Microsoft.

Private Endpoints Configuration

Regardless of which scenario you choose, Private Endpoints (Private Link) are configured the same way:

  1. Add Private Link endpoint FQDNs to the proxy bypass list
  2. Configure DNS to resolve Private Link FQDNs to private IPs
  3. Traffic flows directly to Private Endpoints without going through proxy or Arc Gateway

Private Endpoints by Service Type

Each Azure service has specific requirements when configuring Private Endpoints with Azure Local:

๐Ÿ”

Azure Key Vault

vault.azure.net

Azure Local requires a Key Vault for deployment. Azure Portal and HCI Resource Provider configure secrets during deployment.

โš ๏ธ During Deployment:

Keep public access enabled until initial deployment is complete.

โœ… After Deployment:

Restrict access to private networks only. Other customer Key Vaults for workloads can be fully private from the start.

๐Ÿ’พ

Azure Storage (Blob)

blob.core.windows.net

Required for 2-node deployments as cloud witness. Azure Portal and HCI RP configure the cloud witness during deployment.

โš ๏ธ During Deployment:

Keep public access enabled until initial deployment is complete.

โœ… After Deployment:

Restrict access to private networks only.

๐Ÿ’ก Optional:

If your security team requires source IP validation on the private endpoint, add the storage endpoint to the proxy bypass list so traffic goes directly to your firewall instead of through Arc Gateway tunnel.

๐Ÿ“ฆ

Azure Container Registry (ACR)

azurecr.io

Crucial for AKS image pulls. Customers commonly pull container images for AKS workloads from private ACR endpoints.

๐Ÿšซ No Wildcards:

*.azurecr.io is NOT supported in the bypass list. ARB VM uses specific ACR endpoints and the bypass list applies to both ARB and AKS.

โœ… Required:

Add specific ACR FQDNs to the proxy bypass list before deployment. This is particularly important when AKS clusters run on their own LNET and you want ACR traffic to go directly from AKS subnet to firewall.

๐Ÿ”„

Azure Site Recovery (ASR)

privatelink.siterecovery.windowsazure.com

ASR private endpoint FQDNs are not allowed by Arc Gateway. Traffic must follow one of two outbound paths:

Option 1: Via Enterprise Proxy

Do not add FQDNs to proxy bypass list. Traffic will be rejected by Arc proxy, retry via enterprise proxy.

โš ๏ธ Requirement: SSL inspection must be disabled on the enterprise proxy for ASR endpoints.

๐Ÿ“– Reference

See Enable replication for private endpoints in Azure Site Recovery for detailed configuration.

Private Endpoints Routing by Scenario

Scenario PE Outbound Path Arc Private Link Key Requirements
1. No Proxy, No Arc GW Direct โ†’ ExpressRoute/VPN โŒ Not Supported Configure routing and DNS; no proxy bypass needed
2. Proxy, No Arc GW Proxy bypassed โ†’ ExpressRoute/VPN โŒ Not Supported Add PE FQDNs to proxy bypass list
3. No Proxy, Arc GW Cluster IP proxy bypassed โ†’ ExpressRoute/VPN โŒ Not Supported Add PE FQDNs to Environment Variables bypass after Arc registration
4. Proxy, Arc GW Proxy bypassed โ†’ ExpressRoute/VPN โŒ Not Supported Add PE FQDNs to proxy bypass list during Arc registration

Reserved Subnets: ARB & AKS

The Arc Resource Bridge (ARB) VM reserves specific IP ranges for internal Kubernetes operations. Never use these ranges for your private endpoint networks โ€” traffic will fail to route correctly.

โš ๏ธ Critical: Avoid IP Overlaps

If your private endpoint network uses IPs within these reserved ranges, traffic will fail because ARB/AKS treat them as internal addresses.

ARB Reserved IP Ranges

Service Component Designated IP Range IP Address Range
Arc Resource Bridge Kubernetes Pods 10.244.0.0/16 10.244.0.1 to 10.244.255.254
Arc Resource Bridge Kubernetes Services 10.96.0.0/12 10.96.0.1 to 10.111.255.254

IP Overlap Scenario Example

โŒ Internal Conflict (FAIL)

Endpoint IP: 10.244.1.4

Inside reserved pod range (10.244.0.0/16)

AKS treats this as internal traffic. Traffic never leaves the VNET โ€” routing fails.

โœ… Correct Routing (SUCCESS)

Endpoint IP: 10.245.0.5

Outside reserved pod range

AKS resolves as external traffic. Traffic routes correctly to Private Endpoint.

Best Practices for Private Endpoint Networks

  • ๐Ÿ”
    Verify your Private Endpoint VNETs

    Before deploying, ensure your private endpoint networks do NOT overlap with 10.244.0.0/16 or 10.96.0.0/12

  • ๐Ÿ“‹
    Use non-conflicting address spaces

    Recommended: Use address ranges like 10.0.0.0/16, 10.1.0.0/16, 172.16.0.0/16 for private endpoints

  • ๐Ÿงช
    Test connectivity before production

    Validate private endpoint routing from ARB and AKS workloads in a test environment

Traffic Flow Comparison: Public vs Private Path

Compare how traffic flows through each architecture side-by-side. Both paths handle the same traffic categories but route them differently.

Step 1: Bypass Traffic (Direct Communications)

Traffic that bypasses proxy entirely for internal communications and Private Link endpoints.

๐ŸŒ Public Path

Public Path - Bypass Traffic
  • Internal intranet communications
  • Node-to-node communications
  • Private Link endpoints

๐Ÿ” Private Path

Private Path - Bypass Traffic
  • Internal intranet communications
  • Node-to-node communications
  • Private Link endpoints (via ExpressRoute)

Step 2: HTTP Traffic via Proxy

HTTP traffic that cannot use Arc proxy is routed through enterprise proxy/firewall.

๐ŸŒ Public Path

Public Path - HTTP Traffic
  • Node โ†’ On-premises proxy/firewall
  • Proxy โ†’ Public internet โ†’ Azure

๐Ÿ” Private Path

Private Path - HTTP Traffic
  • Node โ†’ Customer Firewall
  • โ†’ ExpressRoute โ†’ Azure Firewall Explicit Proxy

Step 3: HTTPS Traffic via Arc Proxy

HTTPS traffic destined for Azure endpoints is routed through the Arc proxy to Arc Gateway.

๐ŸŒ Public Path

Public Path - HTTPS via Arc Proxy
  • Node โ†’ Arc Proxy โ†’ On-prem Firewall
  • โ†’ Public Internet โ†’ Arc Gateway โ†’ Azure

๐Ÿ” Private Path

Private Path - HTTPS via Arc Proxy
  • Node โ†’ Arc Proxy โ†’ Customer Firewall
  • โ†’ ExpressRoute โ†’ Azure Firewall โ†’ Arc Gateway โ†’ Azure

Step 4: Azure Resource Bridge (ARB) VM via Cluster IP

ARB VM uses Cluster IP as its proxy endpoint to route traffic through Arc Gateway.

๐ŸŒ Public Path

Public Path - ARB VM
  • ARB VM โ†’ Cluster IP:40343
  • โ†’ Arc Gateway โ†’ Public Internet โ†’ Azure

๐Ÿ” Private Path

Private Path - ARB VM
  • ARB VM โ†’ Cluster IP:40343
  • โ†’ ExpressRoute โ†’ Arc Gateway โ†’ Azure

Step 5: AKS Clusters via Cluster IP Proxy

AKS Control Plane VMs, Worker VMs, and Pods route traffic through Cluster IP proxy.

๐ŸŒ Public Path

Public Path - AKS Clusters
  • AKS VMs/Pods โ†’ Cluster IP:40343
  • โ†’ Arc Gateway โ†’ Public Internet โ†’ Azure

๐Ÿ” Private Path

Private Path - AKS Clusters
  • AKS VMs/Pods โ†’ Cluster IP:40343
  • โ†’ ExpressRoute โ†’ Arc Gateway โ†’ Azure

Step 6: Azure Local VMs via Dedicated Arc Proxy

Each Azure Local VM uses its own dedicated Arc proxy for HTTPS traffic.

๐ŸŒ Public Path

Public Path - VMs
  • VM โ†’ Dedicated Arc Proxy
  • โ†’ Arc Gateway โ†’ Public Internet โ†’ Azure

๐Ÿ” Private Path

Private Path - VMs
  • VM โ†’ Dedicated Arc Proxy
  • โ†’ ExpressRoute โ†’ Arc Gateway โ†’ Azure

Key Routing Differences

Comparing the most complete configurations from each path: Public Path Option 4 (Proxy + Arc Gateway) vs Private Path (Azure FW Explicit Proxy + Arc Gateway)

๐ŸŒ Public Path Routes

Option 4: On-prem Proxy + Arc Gateway

Bypass Traffic

Direct to internal services

HTTP Traffic

On-prem proxy โ†’ Corporate FW โ†’ Public internet

HTTPS Traffic

Arc Proxy โ†’ Corporate FW โ†’ Public internet โ†’ Arc Gateway

ARB/AKS Traffic

Cluster IP โ†’ Arc Proxy โ†’ Corporate FW โ†’ Public internet โ†’ Arc Gateway

๐Ÿ” Private Path Routes

Azure FW Explicit Proxy + Arc Gateway

Bypass Traffic

Direct to internal services

HTTP Traffic

On-prem host โ†’ Corporate FW โ†’ ExpressRoute โ†’ Azure FW Explicit Proxy

HTTPS Traffic

Arc Proxy โ†’ ExpressRoute โ†’ Azure FW โ†’ Arc Gateway

ARB/AKS Traffic

Cluster IP โ†’ Arc Proxy โ†’ ExpressRoute โ†’ Arc Gateway

Traffic Categories

Network traffic is categorized based on how it should be routed. These categories apply to both Public and Private Path architectures.

๐ŸŸฆ

Bypass Traffic

HTTP/HTTPS that must bypass proxy entirely.

  • Internal intranet communications
  • Node-to-node communications
  • Internal management systems
  • Private Link endpoints (Key Vault, Storage)
๐ŸŸจ

HTTP Traffic

HTTP traffic incompatible with Arc proxy.

  • Routes through enterprise proxy
  • Public Path: On-premises proxy
  • Private Path: Azure Firewall Explicit Proxy
๐ŸŸฉ

HTTPS via Arc Proxy

HTTPS always routed through Arc proxy.

  • Microsoft-managed endpoints
  • Secure HTTPS tunnel to Arc Gateway
  • Built-in security and management
๐ŸŸฅ

Third-party HTTPS

HTTPS not permitted through Arc Gateway.

  • OEM endpoints
  • Hardware vendor updates
  • Third-party agents
  • Redirected to firewall/proxy
๐Ÿ“˜

ARB/AKS via Cluster IP

Arc Resource Bridge and AKS traffic.

  • Uses Cluster IP:40343 as proxy
  • Routes through Arc proxy running on the host
  • Control plane and pods

AKS Clusters on Separated Subnet

When AKS clusters run on a separated subnet from the Azure Local infrastructure subnet, additional firewall rules are required.

๐ŸŒ Public Path

AKS Clusters on Separated Subnet - Public Path

๐Ÿ” Private Path

AKS Clusters on Separated Subnet - Private Path

Firewall Requirements

Traffic between AKS subnet and Azure Local Infrastructure subnet

Port Protocol Direction Purpose
40343 HTTPS/HTTP Connect AKS โ†’ Cluster IP Arc Gateway proxy (L4 and L7)
55000 TCP AKS โ†’ Cluster IP Communication
65000 TCP AKS โ†’ Cluster IP Communication
22 TCP Bidirectional SSH
6443 TCP Bidirectional Kubernetes API

๐Ÿ“Œ Additional FQDN Endpoints

Although Arc Gateway reduces the HTTPS endpoints required, you must still allow access to endpoints not supported by Arc Gateway. Refer to the AKS subnet required FQDN endpoints documentation.

Configuration

Proxy Bypass Requirements

When defining your proxy bypass string for Arc initialization or the Companion App, include:

โœ… Required Bypass Entries

  • IP address of each Azure Local machine
  • Cluster IP address
  • Infrastructure network IPs (ARB, AKS, future services)
  • Or bypass the entire infrastructure subnet
  • NetBIOS name of each machine
  • NetBIOS name of the Cluster
  • Domain name with asterisk wildcard (e.g., *.contoso.com)
  • Subnet wildcards (e.g., 192.168.1.*)
  • Private Link endpoints (Key Vault, Storage, etc.)

โŒ Not Supported

  • CIDR notation for subnets
  • <local> strings in bypass list
  • .local domain for proxy server name

Example Bypass String

# Bypass list format (comma-separated)
192.168.1.10,192.168.1.11,192.168.1.12,   # Node IPs
192.168.1.100,                              # Cluster IP
192.168.1.*,                                # Infrastructure subnet
NODE1,NODE2,NODE3,                          # NetBIOS names
CLUSTER01,                                  # Cluster NetBIOS
*.contoso.com,                              # Domain wildcard
keyvault.vault.azure.net,                   # Private Link endpoints
storageaccount.blob.core.windows.net

Registration Script Examples

Use these PowerShell scripts to register Azure Local nodes with Azure Arc. Run on each node as local administrator.

๐Ÿ“œ Option 1: No Proxy, No Arc Gateway

Simplest configuration - direct connection to Azure through firewall only.

๐Ÿ“– Full Documentation โ†—

Set Parameters

# Define tenant and subscription
$Tenant = "YourTenantID"
$Subscription = "YourSubscriptionID"
$RG = "YourResourceGroupName"
$Region = "eastus"  # Do not use spaces or capital letters

Run Registration Script

# Invoke registration (no proxy, no Arc Gateway)
Invoke-AzStackHciArcInitialization `
    -TenantId $Tenant `
    -SubscriptionID $Subscription `
    -ResourceGroup $RG `
    -Region $Region `
    -Cloud "AzureCloud"

๐Ÿ“œ Option 2: Proxy, No Arc Gateway

Traffic routes through enterprise proxy. Proxy handles URL filtering and logging.

๐Ÿ“– Full Documentation โ†—

Set Parameters

# Define tenant and subscription
$Tenant = "YourTenantID"
$Subscription = "YourSubscriptionID"
$RG = "YourResourceGroupName"
$Region = "eastus"  # Do not use spaces or capital letters

# Define proxy server address
$ProxyServer = "http://proxyaddress:port"

# Define bypass list (comma-separated)
# Use "localhost" instead of <local>
# Use * for subnets: 192.168.1.* for /24, 192.168.*.* for /16
# Append * for domains: *.contoso.com
# Include: Node IPs, Cluster IP, Infrastructure IPs, NetBIOS names, Private Endpoints
$ProxyBypassList = "localhost,127.0.0.1,*.contoso.com,machine1,machine2,machine3,192.168.*.*,AzureLocal-1,mykeyvault.vault.azure.net,mystorageaccount.blob.core.windows.net,mystorageaccount.file.core.windows.net"

Run Registration Script

# Invoke registration (with proxy, no Arc Gateway)
Invoke-AzStackHciArcInitialization `
    -TenantId $Tenant `
    -SubscriptionID $Subscription `
    -ResourceGroup $RG `
    -Region $Region `
    -Cloud "AzureCloud" `
    -Proxy $ProxyServer `
    -ProxyBypass $ProxyBypassList

๐Ÿ“œ Option 3: No Proxy, Arc Gateway

Arc Gateway handles Azure connectivity. Reduces firewall rules to fewer than 30 endpoints.

๐Ÿ“– Full Documentation โ†—

Step 1: Get Arc Gateway ID from Azure Portal

# In Azure Portal:
# 1. Go to your Arc gateway resource
# 2. On the Overview page, copy the Resource ID
# Format: /subscriptions/{sub}/resourceGroups/{rg}/providers/Microsoft.HybridCompute/gateways/{name}

Step 2: Set Parameters

# Define tenant and subscription
$Tenant = "YourTenantID"
$Subscription = "YourSubscriptionID"
$RG = "YourResourceGroupName"
$Region = "eastus"  # Do not use spaces or capital letters

# Define Arc Gateway Resource ID from Azure Portal
$ArcgwId = "/subscriptions/yourSubscriptionId/resourceGroups/yourResourceGroupName/providers/Microsoft.HybridCompute/gateways/yourArcGatewayName"

Step 3: Run Registration Script

# Invoke registration (no proxy, with Arc Gateway)
Invoke-AzStackHciArcInitialization `
    -TenantID $Tenant `
    -SubscriptionID $Subscription `
    -ResourceGroup $RG `
    -Region $Region `
    -Cloud "AzureCloud" `
    -ArcGatewayID $ArcgwId

๐Ÿ“œ Option 4: Proxy + Arc Gateway

Best of both worlds: Arc Gateway for HTTPS to Azure, enterprise proxy for HTTP and third-party traffic.

๐Ÿ“– Full Documentation โ†—

Step 1: Get Arc Gateway ID from Azure Portal

# In Azure Portal:
# 1. Go to your Arc gateway resource
# 2. On the Overview page, copy the Resource ID
# Format: /subscriptions/{sub}/resourceGroups/{rg}/providers/Microsoft.HybridCompute/gateways/{name}

Step 2: Set Parameters

# Define tenant and subscription
$Tenant = "YourTenantID"
$Subscription = "YourSubscriptionID"
$RG = "YourResourceGroupName"
$Region = "eastus"  # Do not use spaces or capital letters

# Define proxy server address
$ProxyServer = "http://proxyaddress:port"

# Define bypass list (comma-separated)
# Use "localhost" instead of <local>
# Use * for subnets: 192.168.1.* for /24, 192.168.*.* for /16
# Append * for domains: *.contoso.com
# Include: Node IPs, Cluster IP, Infrastructure IPs, NetBIOS names, Private Endpoints
$ProxyBypassList = "localhost,127.0.0.1,*.contoso.com,machine1,machine2,machine3,192.168.*.*,AzureLocal-1,mykeyvault.vault.azure.net,mystorageaccount.blob.core.windows.net,mystorageaccount.file.core.windows.net"

# Define Arc Gateway Resource ID from Azure Portal
$ArcgwId = "/subscriptions/yourSubscriptionId/resourceGroups/yourResourceGroupName/providers/Microsoft.HybridCompute/gateways/yourArcGatewayName"

Step 3: Run Registration Script

# Invoke registration (with proxy and Arc Gateway)
Invoke-AzStackHciArcInitialization `
    -TenantID $Tenant `
    -SubscriptionID $Subscription `
    -ResourceGroup $RG `
    -Region $Region `
    -Cloud "AzureCloud" `
    -Proxy $ProxyServer `
    -ArcGatewayID $ArcgwId `
    -ProxyBypass $ProxyBypassList

โœ… Verify Registration

After registration completes, verify the setup:

Check Arc Agent Status

# Check Arc agent configuration
& "C:\Program Files\AzureConnectedMachineAgent\azcmagent.exe" show

# Expected values:
# - Agent Status: Connected
# - Using HTTPS Proxy: http://localhost:40343 (when Arc Gateway enabled)
# - Upstream Proxy: Your enterprise proxy (if configured)
# - Azure Arc Proxy: Running (when Arc Gateway enabled)

# Verify connectivity
& "C:\Program Files\AzureConnectedMachineAgent\azcmagent.exe" check

# All URLs should show Reachable: true
# Connection.type should be "gateway" when Arc Gateway is enabled

๐Ÿ’ก Important Notes

  • Run these scripts as local administrator on each Azure Local node
  • During registration, you'll need to authenticate with your Azure account using a device code
  • If using an OEM pre-installed image, an automatic update may trigger (40-45 minutes) - rerun the script after reboot
  • Arc Gateway log location: C:\ProgramData\AzureConnectedMachineAgent\Log\arcproxy.log