Skip to content

Commit 2a046ce

Browse files
authored
Merge pull request #294406 from AbdullahBell/firewall-manager-image-deletion-article
Networking: Firewall Manager: Reducing screenshot usage: 6 articles
2 parents b41aff1 + 98ea1c1 commit 2a046ce

29 files changed

+194
-207
lines changed

articles/firewall-manager/configure-ddos.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Configure Azure DDoS Protection Plan using Azure Firewall Manager
33
description: Learn how to use Azure Firewall Manager to configure Azure DDoS Protection Plan
4-
author: vhorne
5-
ms.author: victorh
4+
author: duau
5+
ms.author: duau
66
ms.service: azure-firewall-manager
77
ms.topic: how-to
88
ms.date: 11/19/2024
@@ -14,11 +14,11 @@ ms.custom: template-how-to
1414
Azure Firewall Manager is a platform to manage and protect your network resources at scale. You can associate your virtual networks with a DDoS protection plan within Azure Firewall Manager.
1515

1616
> [!TIP]
17-
> DDoS Protection currently does not support virtual WANs. However, you can workaround this limitation by force tunneling Internet traffic to an Azure Firewall in a virtual network that has a DDoS Protection Plan associated with it.
17+
> DDoS Protection currently doesn't support virtual WANs. However, you can work around this limitation by force tunneling Internet traffic to an Azure Firewall in a virtual network that has a DDoS Protection Plan associated with it.
1818
1919
Under a single tenant, DDoS protection plans can be applied to virtual networks across multiple subscriptions. For more information about DDoS protection plans, see [Azure DDoS Protection overview](../ddos-protection/ddos-protection-overview.md).
2020

21-
To see how this works, you'll create a firewall policy and then a virtual network secured with an Azure Firewall. Then you'll create a DDoS Protection Plan and then associate it with the virtual network.
21+
To see how this works, you create a firewall policy and then a virtual network secured with an Azure Firewall. Then you create a DDoS Protection Plan and then associate it with the virtual network.
2222

2323
## Create a firewall policy
2424

@@ -57,8 +57,6 @@ Use Firewall Manager to create a secured virtual network.
5757

5858
Create a DDoS Protection Plan using Firewall Manager. You can use the **DDoS Protection Plans** page to create and manage your Azure DDoS Protection Plans.
5959

60-
:::image type="content" source="media/configure-ddos/firewall-ddos.png" alt-text="Screenshot of the Firewall Manager DDoS Protection Plans page":::
61-
6260
1. Open Firewall Manager.
6361
1. Select **DDoS Protection Plans**.
6462
1. Select **Create**.

articles/firewall-manager/ip-groups.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: IP Groups in Azure Firewall Policy
33
description: IP groups allow you to group and manage IP addresses for Azure Firewall policy rules.
44
services: firewall-manager
5-
author: vhorne
5+
author: duau
66
ms.service: azure-firewall-manager
77
ms.custom: devx-track-azurepowershell
88
ms.topic: concept-article
99
ms.date: 12/03/2024
10-
ms.author: victorh
10+
ms.author: duau
1111
---
1212

1313
# IP Groups in Azure Firewall policy
@@ -39,8 +39,6 @@ An IP Group can be created using the Azure portal, Azure CLI, or REST API. For m
3939
1. In the Azure portal search bar, type **IP Groups** and select it. You can see the list of the IP Groups, or you can select **Add** to create a new IP Group.
4040
2. Select an IP Group to open the overview page. You can edit, add, or delete IP addresses or IP Groups.
4141

42-
![IP Groups overview](media/ip-groups/overview.png)
43-
4442
## Manage an IP Group
4543

4644
You can see all the IP addresses in the IP Group and the rules or resources that are associated with it. To delete an IP Group, you must first dissociate the IP Group from the resource that is using it.
@@ -58,8 +56,6 @@ You can see all the IP addresses in the IP Group and the rules or resources that
5856

5957
You can now select **IP Group** as a **Source type** or **Destination type** for the IP address(es) when you create a policy with DNAT, application, or network rules.
6058

61-
:::image type="content" source="media/ip-groups/firewall-ip-group.png" alt-text="IP Groups in Firewall":::
62-
6359
## IP address limits
6460

6561
For IP Group limits, see [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits)

articles/firewall-manager/manage-web-application-firewall-policies.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Manage Azure Web Application Firewall policies
33
description: Learn how to use Azure Firewall Manager to manage Azure Web Application Firewall policies
4-
author: vhorne
5-
ms.author: victorh
4+
author: duau
5+
ms.author: duau
66
ms.service: azure-firewall-manager
77
ms.topic: how-to
88
ms.date: 07/29/2024
@@ -19,12 +19,11 @@ You can centrally create and associate Web Application Firewall (WAF) policies f
1919
## Associate a WAF policy
2020

2121
1. Sign in to the [Azure portal](https://portal.azure.com).
22-
2. In the Azure portal search bar, type **Firewall Manager** and press **Enter**.
23-
3. On the Azure Firewall Manager page, under **Deployments**, select **Application Delivery Platforms**.
24-
:::image type="content" source="media/manage-web-application-firewall-policies/application-delivery-platforms.png" alt-text="Screenshot of Firewall Manager application delivery platforms.":::
22+
1. In the Azure portal search bar, type **Firewall Manager** and press **Enter**.
23+
1. On the Azure Firewall Manager page, under **Deployments**, select **Application Delivery Platforms**.
24+
2525
1. Select your application delivery platform (Front Door or Application Gateway) to associate a WAF policy. In this example, a WAF policy is associated to a Front Door.
2626
1. Select **Manage Security** and then select **Add a new policy association**.
27-
:::image type="content" source="media/manage-web-application-firewall-policies/associate-waf-policy.png" alt-text="Screenshot of Firewall Manager associate WAF policy.":::
2827
1. Select either an existing policy or **Create New**.
2928
1. Select the domain(s) that you want the WAF policy to protect with your Azure Front Door profile.
3029
1. Select **Associate**.
@@ -33,7 +32,6 @@ You can centrally create and associate Web Application Firewall (WAF) policies f
3332

3433
1. On the Azure Firewall Manager page, under **Security**, select **Web application firewall policies** to view all your policies.
3534
1. Select **Add** to create a new WAF policy or import settings from an existing WAF policy.
36-
:::image type="content" source="media/manage-web-application-firewall-policies/web-application-firewall-policies.png" alt-text="Screenshot of Firewall Manager Web Application Firewall policies.":::
3735

3836
## Next steps
3937

Binary file not shown.
Binary file not shown.

0 commit comments

Comments
 (0)