Skip to content

Commit 10117fe

Browse files
committed
fixed tabs and edited TOC and redirect file
1 parent 7884b8e commit 10117fe

File tree

3 files changed

+21
-16
lines changed

3 files changed

+21
-16
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4744,6 +4744,16 @@
47444744
"source_path_from_root": "/articles/virtual-network/tutorial-filter-network-traffic-cli.md",
47454745
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
47464746
"redirect_document_id": false
4747+
},
4748+
{
4749+
"source_path_from_root": "/articles/virtual-network/virtual-network-service-endpoint-policies-portal.md",
4750+
"redirect_url": "/azure/virtual-network/virtual-network-service-endpoint-policies",
4751+
"redirect_document_id": false
4752+
},
4753+
{
4754+
"source_path_from_root": "/articles/virtual-network/virtual-network-service-endpoint-policies-powershell.md",
4755+
"redirect_url": "/azure/virtual-network/virtual-network-service-endpoint-policies",
4756+
"redirect_document_id": false
47474757
}
47484758
]
47494759
}

articles/virtual-network/toc.yml

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -200,12 +200,8 @@
200200
href: ../private-link/create-private-endpoint-powershell.md?toc=/azure/virtual-network/toc.json
201201
- name: Azure CLI
202202
href: ../private-link/create-private-endpoint-cli.md?toc=/azure/virtual-network/toc.json
203-
- name: Using service endpoint policies
204-
items:
205-
- name: Azure portal
206-
href: virtual-network-service-endpoint-policies-portal.md
207-
- name: Azure PowerShell
208-
href: virtual-network-service-endpoint-policies-powershell.md
203+
- name: Service endpoint policies
204+
href: virtual-network-service-endpoint-policies.md
209205
- name: Manage DDoS protection
210206
href: ../ddos-protection/manage-ddos-protection.md
211207
- name: Onboard partners to DDoS Protection

articles/virtual-network/virtual-network-service-endpoint-policies.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ Create a virtual network to contain the resources you create in this tutorial.
9595

9696
1. Select **Create**.
9797

98-
### [PowerShell](#tab/portal)
98+
### [PowerShell](#tab/powershell)
9999

100100
Before creating a virtual network, you have to create a resource group for the virtual network, and all other resources created in this article. Create a resource group with [New-AzResourceGroup](/powershell/module/az.resources/new-azresourcegroup). The following example creates a resource group named *test-rg*:
101101

@@ -222,7 +222,7 @@ Create a network security group and rules to restrict network access for the sub
222222

223223
1. Select **OK**.
224224

225-
### [PowerShell](#tab/portal)
225+
### [PowerShell](#tab/powershell)
226226

227227
Create network security group security rules with [New-AzNetworkSecurityRuleConfig](/powershell/module/az.network/new-aznetworksecurityruleconfig). The following rule allows outbound access to the public IP addresses assigned to the Azure Storage service:
228228

@@ -330,7 +330,7 @@ The steps necessary to restrict network access to resources created through Azur
330330
| -------| ------- |
331331
| Storage account name | Enter **deniedaccount(random-number)**. |
332332

333-
### [PowerShell](#tab/portal)
333+
### [PowerShell](#tab/powershell)
334334

335335
Create the allowed Azure storage account with [New-AzStorageAccount](/powershell/module/az.storage/new-azstorageaccount).
336336

@@ -358,7 +358,6 @@ $storageAcctParams = @{
358358
New-AzStorageAccount @storageAcctParams
359359
```
360360

361-
362361
### [CLI](#tab/cli)
363362

364363
---
@@ -387,7 +386,7 @@ New-AzStorageAccount @storageAcctParams
387386

388387
1. Repeat the steps above to create a file share in **deniedaccount(random-number)**.
389388

390-
### [PowerShell](#tab/portal)
389+
### [PowerShell](#tab/powershell)
391390

392391
### Create allowed storage account
393392

@@ -473,7 +472,7 @@ By default, storage accounts accept network connections from clients in any netw
473472

474473
1. Repeat the steps above to deny network access to **deniedaccount(random-number)**.
475474

476-
### [PowerShell](#tab/portal)
475+
### [PowerShell](#tab/powershell)
477476

478477
Use [Update-AzStorageAccountNetworkRuleSet](/powershell/module/az.storage/update-azstorageaccountnetworkruleset) to deny access to the storage accounts except from the virtual network and subnet you created eariler. Once network access is denied, the storage account is not accessible from any network.
479478

@@ -573,7 +572,7 @@ This section creates the policy definition with the list of allowed resources fo
573572

574573
1. Select **Create**.
575574

576-
### [PowerShell](#tab/portal)
575+
### [PowerShell](#tab/powershell)
577576

578577
Use [Get-AzStorageAccount](/powershell/module/az.storage/get-azstorageaccount) to retrieve the resource ID for the first (allowed) storage account.
579578

@@ -631,7 +630,7 @@ After creating the service endpoint policy, you'll associate it with the target
631630

632631
1. Select **Apply**.
633632

634-
### [PowerShell](#tab/portal)
633+
### [PowerShell](#tab/powershell)
635634

636635
Use [Set-AzVirtualNetworkSubnetConfig](/powershell/module/az.network/set-azvirtualnetworksubnetconfig) to associate the service endpoint policy to the subnet.
637636

@@ -706,7 +705,7 @@ To test network access to a storage account, deploy a VM in the subnet.
706705

707706
1. Select **Create**.
708707

709-
### [PowerShell](#tab/portal)
708+
### [PowerShell](#tab/powershell)
710709

711710
Create a virtual machine in the *subnet-1* subnet with [New-AzVM](/powershell/module/az.compute/new-azvm). When running the command that follows, you are prompted for credentials. The values that you enter are configured as the user name and password for the VM. The `-AsJob` option creates the VM in the background, so that you can continue to the next step.
712711

@@ -817,7 +816,7 @@ Wait for the virtual machine to finish deploying before continuing on to the nex
817816
818817
[!INCLUDE [portal-clean-up.md](~/reusable-content/ce-skilling/azure/includes/portal-clean-up.md)]
819818
820-
### [PowerShell](#tab/portal)
819+
### [PowerShell](#tab/powershell)
821820
822821
When no longer needed, you can use [Remove-AzResourceGroup](/powershell/module/az.resources/remove-azresourcegroup) to remove the resource group and all of the resources it contains:
823822

0 commit comments

Comments
 (0)